Sciweavers

184 search results - page 13 / 37
» Fairness in Wallets with Observer
Sort
View
IJNSEC
2008
190views more  IJNSEC 2008»
13 years 10 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
IH
2005
Springer
14 years 3 months ago
Information-Theoretic Analysis of Security in Side-Informed Data Hiding
Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
Luis Pérez-Freire, Pedro Comesaña, F...
EUROPKI
2007
Springer
14 years 4 months ago
Undeniable Mobile Billing Schemes
An undeniable mobile billing system allows a mobile network service provider to bill its subscribers with trustworthy evidences. Chen, Jan and Chen proposed such a billing system b...
Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen
ICCAD
1998
IEEE
71views Hardware» more  ICCAD 1998»
14 years 2 months ago
High-level variable selection for partial-scan implementation
In this paper, we propose a high-level variable selection for partial-scan approach to improve the testability of digital systems. The testability of a design is evaluated at the ...
Frank F. Hsu, Janak H. Patel
COMCOM
2008
100views more  COMCOM 2008»
13 years 10 months ago
Individual profile graphs for location management in PCS networks
A user's profile, for the purpose of location management in a personal communication service (PCS) network, is formalized as a subgraph of the network graph. This subgraph, t...
Chansophea Chuon, Sumanta Guha