Sciweavers

1449 search results - page 103 / 290
» Secure and Efficient Metering
Sort
View
GI
2003
Springer
15 years 6 months ago
Two-Factor Web Authentication Via Voice
: The increasing pressure for network accessible information and business applications demands secure, interoperable, cost efficient and user self-service authentication procedures...
Jörg Tacke, Andreas Wolf
DIAU
2000
Springer
15 years 4 months ago
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
We present the traffic analysis problem and expose the most important protocols, attacks and design issues. Afterwards, we propose directions for further research. As we are mostl...
Jean-François Raymond
124
Voted
SP
2002
IEEE
144views Security Privacy» more  SP 2002»
15 years 21 days ago
ARMS: An agent-based resource management system for grid computing
provide a scalable and adaptable abstraction of the system architecture. Each agent is able to cooperate with other agents and thereby provide service advertisement and discovery f...
Junwei Cao, Stephen A. Jarvis, Subhash Saini
100
Voted
COCO
2009
Springer
113views Algorithms» more  COCO 2009»
15 years 7 months ago
Are PCPs Inherent in Efficient Arguments?
Starting with Kilian (STOC ‘92), several works have shown how to use probabilistically checkable proofs (PCPs) and cryptographic primitives such as collision-resistant hashing to...
Guy N. Rothblum, Salil P. Vadhan
AUTONOMICS
2007
ACM
15 years 5 months ago
Efficient operation in sensor and actor networks inspired by cellular signaling cascades
The investigation and the development of self-organizing systems are especially needed for operation and control in massively distributed systems such as Sensor and Actor Networks...
Falko Dressler, Isabel Dietrich, Reinhard German, ...