Sciweavers

161 search results - page 18 / 33
» Verifying Compensating Transactions
Sort
View
73
Voted
IJACTAICIT
2010
121views more  IJACTAICIT 2010»
14 years 7 months ago
On Improving Feasibility and Security Measures of Online Authentication
Online service is an important driving force behind many of today's Web 2.0 applications. For security and privacy concerns, authentication is required for all of services th...
Jing-Chiou Liou, Sujith Bhashyam
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 1 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
GLOBECOM
2006
IEEE
15 years 3 months ago
Further Analysis of XCP Equilibrium Performance
— Low analyzes the equilibrium performance of the recently developed eXplicit Control Protocol (XCP) by applying the derived window-based dynamical model. However, Low’s window...
Peng Wang, David L. Mills
ASIACRYPT
2008
Springer
14 years 11 months ago
Ambiguous Optimistic Fair Exchange
Optimistic fair exchange (OFE) is a protocol for solving the problem of exchanging items or services in a fair manner between two parties, a signer and a verifier, with the help o...
Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Su...
AROBOTS
2000
108views more  AROBOTS 2000»
14 years 9 months ago
Optimal Selection of Uncertain Actions by Maximizing Expected Utility
A new means of action selection via utility fusion is introduced as an alternative to both sensor fusion and command fusion. Distributed asynchronous behaviors indicate the utility...
Julio Rosenblatt