Sciweavers

2601 search results - page 13 / 521
» Secure Rewarding Schemes
Sort
View
89
Voted
IPL
2002
79views more  IPL 2002»
14 years 11 months ago
A self-adjusting quality of service control scheme
We propose and analyze a self-adjusting Quality of Service (QoS) control scheme with the goal of optimizing the system reward as a result of servicing different priority clients w...
Sheng-Tzong Cheng, Ing-Ray Chen
TC
2008
14 years 11 months ago
On the Computational Security of a Distributed Key Distribution Scheme
In a distributed key distribution scheme, a set of servers help a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some server...
Vanesa Daza, Javier Herranz, Germán S&aacut...
ASIACRYPT
2004
Springer
15 years 5 months ago
On Provably Secure Time-Stamping Schemes
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the underlying hash function is collisionresistant but still no rigorous proofs have...
Ahto Buldas, Märt Saarepera
WPES
2005
ACM
15 years 5 months ago
Quantitative evaluation of unlinkable ID matching schemes
Yasunobu Nohara, Sozo Inoue, Kensuke Baba, Hiroto ...
ETT
2000
149views Education» more  ETT 2000»
14 years 11 months ago
Channel Allocation with Recovery Strategy in Wireless Networks
With the increasing penetration of wireless communications systems, customers are expecting the same level of service, reliability and performance from the wireless communication s...
Yue Ma, James J. Han, Kishor S. Trivedi