Sciweavers

5722 search results - page 339 / 1145
» Security Function Interactions
Sort
View
146
Voted
SPIN
2010
Springer
15 years 2 months ago
Time-Bounded Reachability in Distributed Input/Output Interactive Probabilistic Chains
Abstract. We develop an algorithm to compute timed reachability probabilities for distributed models which are both probabilistic and nondeterministic. To obtain realistic results ...
Georgel Calin, Pepijn Crouzen, Pedro R. D'Argenio,...
270
Voted
ICMCS
2008
IEEE
439views Multimedia» more  ICMCS 2008»
15 years 10 months ago
Framework for virtual collaboration emphasized by awareness information and asynchronous interaction
In this paper, we propose a framework which allows remote users to form conversation groups based on spatial relationship in a shared virtual space. Our proposed framework can tra...
Tomo Matsuda, Naoki Shibata, Keiichi Yasumoto, Min...
141
Voted
LISA
2008
15 years 6 months ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
142
Voted
TIFS
2008
149views more  TIFS 2008»
15 years 3 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu
151
Voted
JOC
2007
94views more  JOC 2007»
15 years 3 months ago
On Unconditionally Secure Distributed Oblivious Transfer
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one o...
Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Dou...