Sciweavers

41 search results - page 6 / 9
» A New Logic for Electronic Commerce Protocols
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 11 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
AGENTCL
2000
Springer
13 years 11 months ago
Dialogue in Team Formation
The process of cooperative problem solving can be divided into four stages. First, finding potential team members, then forming a team followed by constructing a plan for that tea...
Frank Dignum, Barbara Dunin-Keplicz, Rineke Verbru...
ICEIS
2003
IEEE
14 years 27 days ago
Distributed Overload Control for Real-Time Replicated Database Systems
: In order to meet their temporal constraints, current applications such as Web-based services and electronic commerce use the technique of data replication. To take the replicatio...
Samia Saad-Bouzefrane, Claude Kaiser
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
23
Voted
ATAL
2003
Springer
13 years 11 months ago
A false-name-proof double auction protocol for arbitrary evaluation values
We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategyproofness...
Yuko Sakurai, Makoto Yokoo