Sciweavers

5324 search results - page 707 / 1065
» Internet Security Protocols
Sort
View
OOPSLA
1995
Springer
15 years 8 months ago
How and Why to Encapsulate Class Trees
eusable framework, pattern or module interface usually is represented by abstract They form an abstract design and leave the implementation to concrete subclasses. ract design is ...
Dirk Riehle
ATC
2006
Springer
15 years 7 months ago
Managing Trust in Distributed Agent Systems
Abstract. Software agent technology has attracted much attention for developing various distributed systems, composed of autonomous agents interacting with one another using partic...
Stephen S. Yau
138
Voted
DRMTICS
2005
Springer
15 years 7 months ago
A Novel Framework for Multiple Creatorship Protection of Digital Movies
A digital movie can be created jointly under the cooperation of many creators. It is then necessary to provide protection to the creatorship of each participating creator. In this ...
Yu-Quan Zhang, Sabu Emmanuel
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 6 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
ESORICS
2010
Springer
15 years 6 months ago
Providing Mobile Users' Anonymity in Hybrid Networks
We present a novel hybrid communication protocol that guarantees mobile users' k-anonymity against a wide-range of adversaries by exploiting the capability of handheld devices...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...