Sciweavers

516 search results - page 63 / 104
» Comparing Two Information Flow Security Properties
Sort
View
ITNG
2008
IEEE
14 years 3 months ago
Chord-Based Key Establishment Schemes for Sensor Networks
— Because of limited resources at sensor nodes, sensor networks typically adopt symmetric-key algorithms to provide security functions such as protecting communications between n...
Fan Zhang, Zhijie Jerry Shi, Bing Wang
EEE
2004
IEEE
14 years 19 days ago
A Privacy-Friendly Loyalty System for Electronic Marketplaces
Loyalty systems provide an interesting possibility for vendors in customer relationship management. This holds for both real world and online vendors. Beside potential benefits of...
Matthias Enzmann, Markus Schneider 0002
WWW
2005
ACM
14 years 9 months ago
An abuse-free fair contract signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
TIFS
2010
186views more  TIFS 2010»
13 years 7 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
CAISE
2009
Springer
14 years 3 months ago
Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach
Meta models are the core of enterprise architecture, but still few methods are available for the creation of meta models tailored for specific purposes. This paper presents two app...
Robert Lagerström, Jan Saat, Ulrik Franke, St...