Sciweavers

1039 search results - page 100 / 208
» networks 1998
Sort
View
EUROCRYPT
1998
Springer
15 years 4 months ago
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack is a requirement. However, prior to the results presented here, there ap...
Victor Shoup, Rosario Gennaro
NDSS
1998
IEEE
15 years 4 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
TSMC
1998
132views more  TSMC 1998»
14 years 11 months ago
Decision support for vehicle dispatching using genetic programming
—Vehicle dispatching consists of allocating real-time service requests to a fleet of moving vehicles. In this paper, each vehicle is associated with a vector of attribute values...
Ilham Benyahia, Jean-Yves Potvin
ICNP
1998
IEEE
15 years 4 months ago
A Definition of General Weighted Fairness and its Support in Explicit Rate Switch Algorithms
In this paper we give a general definition of weighted fairness and discuss how a pricing policy can be mapped to general weighted (GW) fairness. The GW fairness can be achieved b...
Bobby Vandalore, Sonia Fahmy, Raj Jain, Rohit Goya...
ISWC
1998
IEEE
15 years 4 months ago
Development of a Commercially Successful Wearable Data Collection System
Symbol Technologies has completed a unique accomplishment; it has created a commercially successful Wearable Computer. The success of this product is directly due to a structured ...
Robert Stein, Stephen Ferrero, Margaret Hetfield, ...