Sciweavers

17 search results - page 3 / 4
» The Fundamental Inadequacies of Conventional Public Key Infr...
Sort
View
98
Voted
CSI
2007
91views more  CSI 2007»
15 years 1 months ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
TC
2008
15 years 1 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
ICAS
2005
IEEE
143views Robotics» more  ICAS 2005»
15 years 7 months ago
Approaches to P2P Internet Application Development
Research in overlay and P2P networking has been tightly focused on fundamentals in the last few years, leading to developments on a range of important issues. The time has come to...
Thabotharan Kathiravelu, Arnold Pears
NAR
2011
226views Computer Vision» more  NAR 2011»
14 years 4 months ago
The International Nucleotide Sequence Database Collaboration
Under the International Nucleotide Sequence Database Collaboration (INSDC; http://www.insdc. org), globally comprehensive public domain nucleotide sequence is captured, preserved ...
Guy Cochrane, Ilene Karsch-Mizrachi, Yasukazu Naka...
ISQED
2006
IEEE
124views Hardware» more  ISQED 2006»
15 years 7 months ago
DFM Metrics for Standard Cells
Design for Manufacturability (DFM) is becoming increasingly important as process geometries shrink. Conventional design rule pass/fail is not adequate to quantify DFM compliance. ...
Robert C. Aitken