Sciweavers

610 search results - page 104 / 122
» Information-theoretically secure protocols and security unde...
Sort
View
ICPPW
2006
IEEE
15 years 3 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
79
Voted
BROADNETS
2005
IEEE
15 years 3 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou
82
Voted
AGENTS
2001
Springer
15 years 2 months ago
Intelligent agents for an artificial market system
This paper describes an agent-based artificial market system whose underlying interaction protocols provide advanced features. Using the system, actors (i.e., customers and mercha...
Nikos I. Karacapilidis, Pavlos Moraitis
AGENTS
1998
Springer
15 years 1 months ago
Competitive Scenarios for Heterogeneous Trading Agents
We present a framework for de ning trading scenarios based on sh market auctions. In these scenarios, agents of arbitrary complexity can participate in electronic auctions under ...
Juan A. Rodríguez-Aguilar, Francisco J. Mar...
ACISP
2007
Springer
15 years 1 months ago
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication
We study the multicast stream authentication problem when the communication channel is under control of an opponent who can drop, reorder and inject data packets. In this work, we...
Christophe Tartary, Huaxiong Wang