Sciweavers

741 search results - page 122 / 149
» Verification of security protocols using LOTOS-method and ap...
Sort
View
MOBISYS
2005
ACM
16 years 3 months ago
MediaAlert: a broadcast video monitoring and alerting system for mobile users
? We present a system for automatic monitoring and timely dissemination of multimedia information to a range of mobile information appliances based on each user's interest pro...
Bin Wei, Bernard Renger, Yih-Farn Chen, Rittwik Ja...
SIGIR
2009
ACM
15 years 10 months ago
Link analysis for private weighted graphs
Link analysis methods have been used successfully for knowledge discovery from the link structure of mutually linking entities. Existing link analysis methods have been inherently...
Jun Sakuma, Shigenobu Kobayashi
ACISICIS
2008
IEEE
15 years 10 months ago
SIMPA: A SIP-Based Mobile Payment Architecture
In recent years, many Mobile Payment (MP) schemes have been proposed and used in practise. However, a prerequisite for extended acceptance and adoption of MP technologies is to de...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
FC
2005
Springer
142views Cryptology» more  FC 2005»
15 years 9 months ago
Testing Disjointness of Private Datasets
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible values and wish to test whether these sets are disjoint or not. In this paper we ...
Aggelos Kiayias, Antonina Mitrofanova
166
Voted
ECUMN
2007
Springer
15 years 10 months ago
Study and Enhancement of DCCP over DiffServ Assured Forwarding Class
The Datagram Congestion Control Protocol (DCCP) has been proposed as a transport protocol which supports real-time traffic. In this paper, we focus on the use of DCCP/CCID3 (Cong...
Emmanuel Lochin, Guillaume Jourjon, Laurent Dairai...