Sciweavers

7961 search results - page 1413 / 1593
» Input-Output Model Programs
Sort
View
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 8 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
174
Voted
WCW
2004
Springer
15 years 8 months ago
Dynamic Content Placement for Mobile Content Distribution Networks
As wireless networks increase in popularity, the development of efficient content distribution techniques to meet the growing and constantly changing client demand becomes a necess...
Wagner Moro Aioffi, Geraldo Robson Mateus, Jussara...
BIBE
2003
IEEE
15 years 8 months ago
Requirements of Phylogenetic Databases
We examine the organizational impact on phylogenetic databases of the increasing sophistication in the need and use of phylogenetic data. A primary issue is the use of the unnorma...
Luay Nakhleh, Daniel P. Miranker, François ...
126
Voted
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
15 years 8 months ago
A Protocol for Programmable Smart Cards
This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host ...
Tommaso Cucinotta, Marco Di Natale, David Corcoran
125
Voted
HICSS
2003
IEEE
120views Biometrics» more  HICSS 2003»
15 years 8 months ago
A Primitive Study of Logrolling in e-Negotiation
e-Negotiation involves two or more agents multilaterally bargaining for mutual gain, using information technologies in a cooperative problem-solving (CPS) environment. This paper ...
Patrick C. K. Hung
« Prev « First page 1413 / 1593 Last » Next »