Sciweavers

6907 search results - page 103 / 1382
» Securing distributed adaptation
Sort
View
FC
1998
Springer
83views Cryptology» more  FC 1998»
15 years 2 months ago
Distributed Trustees and Revocability: A Framework for Internet Payment
From von Solms and Naccache's standpoint, constructing a practical and secure e-money system implies a proper regulation of its privacy level. Furthermore, when the system ben...
David M'Raïhi, David Pointcheval
ACNS
2006
Springer
96views Cryptology» more  ACNS 2006»
14 years 12 months ago
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
In this paper, we model the adversary (eavesdropper) present in the wireless communication medium using probabilistic models. We precisely formulate the security-throughput optimiz...
Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarat...
HPDC
2009
IEEE
15 years 4 months ago
An adaptive online system for efficient processing of hierarchical data
Athanasia Asiki, Dimitrios Tsoumakos, Nectarios Ko...