Sciweavers

3504 search results - page 541 / 701
» Secure protocol composition
Sort
View
100
Voted
ICICS
2004
Springer
15 years 7 months ago
Robust Metering Schemes for General Access Structures
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) metering schemes secure against coalitions of corrupt servers and clients. They sho...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
SCN
2004
Springer
121views Communications» more  SCN 2004»
15 years 7 months ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel
HOLOMAS
2003
Springer
15 years 6 months ago
Agent Exchange - Virtual Trading Environment
Agent Exchange is a virtual trading environment serving as a test bed for experiments with market simulations, trading strategies and auctioning techniques. Agent Exchange is the d...
Jirí Hodík, Milan Rollo, Petr Nov&aa...
151
Voted
WISA
2009
Springer
15 years 6 months ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar
101
Voted
AGENTS
2001
Springer
15 years 6 months ago
Trust-based facilitator for e-partnerships
In this paper, we propose a facilitator that finds capable and trustworthy partners on behalf of client users, which helps users form and maintain e-partnerships for electronic co...
Chihiro Ono, Boyd C. Paulson Jr., Dai Kanetomo, Ma...