Sciweavers

5722 search results - page 917 / 1145
» Security Function Interactions
Sort
View
EEE
2005
IEEE
15 years 9 months ago
On Comprehensive Contractual Descriptions of Web Services
Comprehensive contractual description of Web Services and Web Service compositions is needed for selection of appropriate Web Services and their service and quality of service (Qo...
Vladimir Tosic, Bernard Pagurek
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
SIGECOM
2004
ACM
132views ECommerce» more  SIGECOM 2004»
15 years 9 months ago
A dynamic pari-mutuel market for hedging, wagering, and information aggregation
I develop a new mechanism for risk allocation and information speculation called a dynamic pari-mutuel market (DPM). A DPM acts as hybrid between a pari-mutuel market and a contin...
David M. Pennock
SIGOPSE
2004
ACM
15 years 9 months ago
Defending against eclipse attacks on overlay networks
Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor no...
Atul Singh, Miguel Castro, Peter Druschel, Antony ...
ICWE
2004
Springer
15 years 9 months ago
WebRatio, an Innovative Technology for Web Application Development
A data–intensive Web application is a Web-enabled software system for the publication and management of large data collections, typically stored in one or more database manageme...
Roberto Acerbis, Aldo Bongio, Stefano Butti, Stefa...