Sciweavers

752 search results - page 121 / 151
» Abstract models for dialogue protocols
Sort
View
199
Voted
TSMC
2010
14 years 10 months ago
Grid Resource Negotiation: Survey and New Directions
Abstract--Since Grid computing systems involve large-scale resource sharing, resource management is central to their operations. Whereas there are more Grid resource management sys...
Kwang Mong Sim
136
Voted
DIMVA
2011
14 years 7 months ago
What's Clicking What? Techniques and Innovations of Today's Clickbots
Abstract. With the widespread adoption of Internet advertising, fraud has become a systemic problem. While the existence of clickbots—malware specialized for conducting click-fra...
Brad Miller, Paul Pearce, Chris Grier, Christian K...
119
Voted
ISW
2004
Springer
15 years 9 months ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner
STOC
2004
ACM
152views Algorithms» more  STOC 2004»
16 years 3 months ago
Exponential separation of quantum and classical one-way communication complexity
Abstract. We give the first exponential separation between quantum and bounded-error randomized one-way communication complexity. Specifically, we define the Hidden Matching Proble...
Ziv Bar-Yossef, T. S. Jayram, Iordanis Kerenidis
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
15 years 10 months ago
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Abstract. We examine the use of randomness extraction and expansion in key agreement (KA) protocols to generate uniformly random keys in the standard model. Although existing works...
Yvonne Cliff, Colin Boyd, Juan Manuel Gonzá...