Sciweavers

610 search results - page 63 / 122
» Predicate-Based Key Exchange
Sort
View
122
Voted
IEEECIT
2010
IEEE
15 years 15 days ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao
101
Voted
IAT
2008
IEEE
15 years 9 months ago
Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making
The recent emergence of location-based social networking services is revolutionizing web-based social networking allowing users to share real-life experiences via geo-tagged user-...
Touhid Bhuiyan, Yue Xu, Audun Jøsang
SASO
2007
IEEE
15 years 8 months ago
Towards Supporting Interactions between Self-Managed Cells
Management in pervasive systems cannot rely on human intervention or centralised decision-making functions. It must be devolved, based on local decision-making and feedback contro...
Alberto E. Schaeffer Filho, Emil C. Lupu, Naranker...
116
Voted
ATAL
2007
Springer
15 years 8 months ago
On the Behavior of Competing Markets Populated by Automated Traders
Abstract. Real market institutions, stock and commodity exchanges for example, do not occur in isolation. Company stock is frequently listed on several stock exchanges, allowing tr...
Jinzhong Niu, Kai Cai, Simon Parsons, Elizabeth Sk...
128
Voted
DNIS
2007
Springer
103views Database» more  DNIS 2007»
15 years 8 months ago
A Formalism for Navigating and Editing XML Document Structure
The use of XML has become pervasive. It is used in a range of data storage and data exchange applications. In many cases such XML data is captured from users via forms or transform...
Frithjof Dau, Mark Sifer