Sciweavers

6907 search results - page 183 / 1382
» Securing distributed adaptation
Sort
View
84
Voted
WISTP
2010
Springer
15 years 5 months ago
Trust in Peer-to-Peer Content Distribution Protocols
Abstract. The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to pee...
Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs
70
Voted
INFORMATICALT
2002
118views more  INFORMATICALT 2002»
14 years 10 months ago
Cryptanalysis and Improvement of Key Distribution System for VSAT Satellite Communications
Recently, Park and Lim (1998) proposed two key distribution systems for secure VSAT satellite communications. One provides indirect authentication, and another scheme enables that ...
Yuh-Min Tseng
75
Voted
CTRSA
2006
Springer
118views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Stand-Alone and Setup-Free Verifiably Committed Signatures
Abstract. In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signat...
Huafei Zhu, Feng Bao
ACSAC
1999
IEEE
15 years 2 months ago
An Asynchronous Distributed Access Control Architecture for IP over ATM Networks
In this article, we describe a new architecture providing the access control service in both ATM and IPover-ATM networks. This architecture is based on agents distributed in netwo...
Olivier Paul, Maryline Laurent, Sylvain Gombault
AGENTS
1998
Springer
15 years 2 months ago
A Multiagent Perspective of Parallel and Distributed Machine Learning
Parallel and distributed information processing systems play an increasingly important role in artificial intelligence and computer science. In this article an approach to learnin...
Gerhard Weiß