Sciweavers

2228 search results - page 441 / 446
» Electronic Payment Systems
Sort
View
JUCS
2008
156views more  JUCS 2008»
13 years 7 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
NETWORK
2008
153views more  NETWORK 2008»
13 years 7 months ago
IEEE 802.11s: WLAN mesh standardization and high performance extensions
In recent years, remarkable market competition and economy of scale has resulted in the price erosion of wireless devices for consumer electronics. Especially for wireless data ne...
Guido R. Hiertz, Yunpeng Zang, Sebastian Max, Thom...
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
BMCBI
2005
187views more  BMCBI 2005»
13 years 7 months ago
JAtlasView: a Java atlas-viewer for browsing biomedical 3D images and atlases
Background: Many three-dimensional (3D) images are routinely collected in biomedical research and a number of digital atlases with associated anatomical and other information have...
Guangjie Feng, Nick Burton, Bill Hill, Duncan Davi...
BMCBI
2005
116views more  BMCBI 2005»
13 years 7 months ago
Which gene did you mean?
Computational Biology needs computer-readable information records. Increasingly, meta-analysed and pre-digested information is being used in the follow up of high throughput exper...
Barend Mons