Sciweavers

6907 search results - page 900 / 1382
» Securing distributed adaptation
Sort
View
FC
2005
Springer
120views Cryptology» more  FC 2005»
15 years 9 months ago
Achieving Fairness in Private Contract Negotiation
Abstract. Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has ce...
Keith B. Frikken, Mikhail J. Atallah
MDAI
2005
Springer
15 years 9 months ago
One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receive...
Takeshi Okamoto, Raylin Tso, Eiji Okamoto
MIDDLEWARE
2005
Springer
15 years 9 months ago
A reconfigurable group management middleware service for wireless sensor networks
Group management service plays a key role in wireless sensor networks (WSNs) as it provides support to high level middleware services such as object tracking, security, fault-tole...
Mardoqueu Vieira, Nelson Souto Rosa
MMMACNS
2005
Springer
15 years 9 months ago
Unique User-Generated Digital Pseudonyms
Abstract. This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pse...
Peter Schartner, Martin Schaffer
WISA
2005
Springer
15 years 9 months ago
Video Fingerprinting System Using Wavelet and Error Correcting Code
In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the ...
Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, H...