Sciweavers

336 search results - page 28 / 68
» Mobile values, new names, and secure communication
Sort
View
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
15 years 2 months ago
A Marketing Model for Mobile Wireless Services
: 1 Invaluable feedback from HIICS referees is gratefully acknowledged. Mobile data services integrate handheld and Internet technologies to create new value propositions (Keen and...
A. Lee Gilbert, Jon D. Kendall
80
Voted
EEE
2004
IEEE
15 years 1 months ago
An Efficient, Secure and Delegable Micro-Payment System
In this paper, we propose a new efficient and secure micro-payment scheme, named e-coupons, which can provide the users the facility of delegating their spending capability to oth...
Vishwas Patil, R. K. Shyamasundar
85
Voted
ICALP
2005
Springer
15 years 3 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
83
Voted
CORR
2010
Springer
99views Education» more  CORR 2010»
14 years 9 months ago
A New Phase Transition for Local Delays in MANETs
: We study a slotted version of the Aloha Medium Access (MAC) protocol in a Mobile Ad-hoc Network (MANET). Our model features transmitters randomly located in the Euclidean plane, ...
François Baccelli, Bartek Blaszczyszyn
VOTEID
2007
Springer
15 years 3 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...