Sciweavers

519 search results - page 48 / 104
» How to make secure email easier to use
Sort
View
PODC
2003
ACM
15 years 3 months ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
ATVA
2005
Springer
111views Hardware» more  ATVA 2005»
15 years 3 months ago
Model Checking Prioritized Timed Automata
Abstract. Priorities are often used to resolve conflicts in timed systems. However, priorities are not directly supported by state-of-art model checkers. Often, a designer has to ...
Shang-Wei Lin, Pao-Ann Hsiung, Chun-Hsian Huang, Y...
DAWAK
2006
Springer
14 years 11 months ago
Towards Multidimensional Requirement Design
Abstract. Data warehouses (DW) main objective is to facilitating decisionmaking. Thus their development has to take into account DW project actor requirements. While much recent re...
Estella Annoni, Franck Ravat, Olivier Teste, Gille...
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 1 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
FC
2005
Springer
88views Cryptology» more  FC 2005»
15 years 3 months ago
Small Coalitions Cannot Manipulate Voting
We demonstrate how to make voting protocols resistant against manipulation by computationally bounded malicious voters, by extending the previous results of Conitzer and Sandholm i...
Edith Elkind, Helger Lipmaa