Sciweavers

4592 search results - page 700 / 919
» Framework for Studying Substitution
Sort
View
ACMICEC
2007
ACM
103views ECommerce» more  ACMICEC 2007»
14 years 2 months ago
Sampling of information goods
With the development of information technology and the emergence of electronic market places, great business opportunities are created with reduced spatial restraints, lowered sea...
Chong (Alex) Wang, Xiaoquan (Michael) Zhang
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
14 years 2 months ago
The impact of technology on the quality of information
When new technologies for production and dissemination of information emerge and are adopted, we see a dramatic increase in the quantity of information that is made available for ...
Aditi Mukherjee, Jungpil Hahn
B
2007
Springer
14 years 2 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
MMB
2010
Springer
182views Communications» more  MMB 2010»
14 years 2 months ago
CrossTrace: Cross-Layer Measurement for IEEE 802.11 Wireless Testbeds
In this paper, we introduce and evaluate CrossTrace, a framework for performing cross-layer measurements in IEEE 802.11 based wireless networks. CrossTrace allows tracing of parame...
Simon Frohn, Sascha Gübner, Christoph Lindema...
TCC
2010
Springer
170views Cryptology» more  TCC 2010»
14 years 2 months ago
On Related-Secret Pseudorandomness
Related-key attacks are attacks against constructions which use a secret key (such as a blockcipher) in which an attacker attempts to exploit known or chosen relationships among ke...
David Goldenberg, Moses Liskov