Sciweavers

722 search results - page 125 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
TIFS
2010
186views more  TIFS 2010»
14 years 10 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
ACMSE
2004
ACM
15 years 5 months ago
Role of the resource broker in the Grid
Today, as Grid Computing is becoming a reality, there is a need for managing and monitoring the available resources worldwide, as well as the need for conveying these resources to...
Enis Afgan
FM
1999
Springer
93views Formal Methods» more  FM 1999»
15 years 4 months ago
Group Principals and the Formalization of Anonymity
We introduce the concept of a group principal and present a number of different classes of group principals, including threshold-group-principals. These appear to naturally usefu...
Paul F. Syverson, Stuart G. Stubblebine
CORR
2008
Springer
148views Education» more  CORR 2008»
14 years 12 months ago
Conversion/Preference Games
We introduce the concept of Conversion/Preference Games, or CP games for short. CP games generalize the standard notion of strategic games. First we exemplify the use of CP games. ...
Stéphane Le Roux, Pierre Lescanne, Ren&eacu...
TIT
2011
144views more  TIT 2011»
14 years 6 months ago
Network Generalized Hamming Weight
— In this paper, we extend the notion of generalized Hamming weight for classical linear block code to linear network codes by introducing the network generalized Hamming weight ...
Chi Kin Ngai, Raymond W. Yeung, Zhen Zhang