Sciweavers

6907 search results - page 103 / 1382
» Securing distributed adaptation
Sort
View
FC
1998
Springer
83views Cryptology» more  FC 1998»
15 years 7 months ago
Distributed Trustees and Revocability: A Framework for Internet Payment
From von Solms and Naccache's standpoint, constructing a practical and secure e-money system implies a proper regulation of its privacy level. Furthermore, when the system ben...
David M'Raïhi, David Pointcheval
ACNS
2006
Springer
96views Cryptology» more  ACNS 2006»
15 years 5 months ago
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
In this paper, we model the adversary (eavesdropper) present in the wireless communication medium using probabilistic models. We precisely formulate the security-throughput optimiz...
Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarat...
HPDC
2009
IEEE
15 years 9 months ago
An adaptive online system for efficient processing of hierarchical data
Athanasia Asiki, Dimitrios Tsoumakos, Nectarios Ko...