Sciweavers

2601 search results - page 60 / 521
» Secure Rewarding Schemes
Sort
View
COMCOM
2010
92views more  COMCOM 2010»
14 years 10 months ago
A secure and efficient SIP authentication scheme for converged VoIP networks
Eun-Jun Yoon, Kee-Young Yoo, Cheonshik Kim, YouSik...
JISE
2010
69views more  JISE 2010»
14 years 6 months ago
An Efficient Secure Deletion Scheme for Flash File Systems
Jaeheung Lee, Sangho Yi, Junyoung Heo, Hyungbae Pa...
IJNSEC
2010
127views more  IJNSEC 2010»
14 years 6 months ago
Identity-based Threshold Signature Secure in the Standard Model
Recently, design of Identity-based (ID-based) threshold signature schemes which are efficient and provably secure in the standard model has drawn great concerns. In this paper, an...
Hu Xiong, Zhiguang Qin, Fagen Li
WWIC
2005
Springer
129views Communications» more  WWIC 2005»
15 years 5 months ago
Comparison of Incentive-Based Cooperation Strategies for Hybrid Networks
Today’s public Wireless LANs are restricted to hotspots. With the current technology, providers can only target a small audience and in turn charge high prices for their service ...
Attila Weyland, Thomas Staub, Torsten Braun