Sciweavers

2363 search results - page 436 / 473
» How Secure is RFID
Sort
View
141
Voted
SIGECOM
2008
ACM
122views ECommerce» more  SIGECOM 2008»
15 years 4 months ago
On the windfall of friendship: inoculation strategies on social networks
This paper studies a virus inoculation game on social networks. A framework is presented which allows the measuring of the windfall of friendship, i.e., how much players benefit i...
Dominic Meier, Yvonne Anne Oswald, Stefan Schmid, ...
135
Voted
JSA
2007
139views more  JSA 2007»
15 years 4 months ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...
WICOMM
2008
108views more  WICOMM 2008»
15 years 4 months ago
The multimedia broadcast/multicast service
Abstract-- This article provides an overview of the multimedia broadcast/multicast service (MBMS) for universal mobile telecommunications system (UMTS) networks. We first outline t...
George Xylomenos, Vasilis Vogkas, George Thanos
135
Voted
COMCOM
2000
125views more  COMCOM 2000»
15 years 4 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
CORR
2002
Springer
74views Education» more  CORR 2002»
15 years 4 months ago
A logical reconstruction of SPKI
SPKI/SDSI is a proposed public key infrastructure standard that incorporates the SDSI public key infrastructure. SDSI's key innovation was the use of local names. We previous...
Joseph Y. Halpern, Ron van der Meyden