Sciweavers

3638 search results - page 717 / 728
» Distribution chain security
Sort
View
ISEC
2001
Springer
126views ECommerce» more  ISEC 2001»
14 years 3 days ago
Building Trust for E-Commerce: Collaborating Label Bureaus
A major problem facing the full deployment of business-to-consumer (B2C) e-commerce is the development of trust on the side of the consumer. People develop trust in a business thr...
Michael A. Shepherd, Anil Dhonde, Carolyn R. Watte...
LCTRTS
2001
Springer
14 years 3 days ago
Middleware For Building Adaptive Systems Via Configuration
1 COTS (commercial off-the-shelf) devices are capable of executing powerful, distributed algorithms. Very large, adaptive systems can be created by simply integrating these devices...
Sanjai Narain, Ravichander Vaidyanathan, Stanley M...
REFLECTION
2001
Springer
14 years 2 days ago
Performance and Integrity in the OpenORB Reflective Middleware
, are to address what we perceive as the most pressing shortcomings of current reflective middleware platforms. First, performance: in the worst case, this needs to be on a par wit...
Gordon S. Blair, Geoff Coulson, Michael Clarke, Ni...
WAN
1998
Springer
13 years 12 months ago
The NRW Metacomputing Initiative
In this paper the Northrhine-Westphalian metacomputing initiative is described. We start by discussing various general aspects of metacomputing and explain the reasons for founding...
Uwe Schwiegelshohn, Ramin Yahyapour
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
13 years 11 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor