Sciweavers

5324 search results - page 843 / 1065
» Internet Security Protocols
Sort
View
AGENTS
2000
Springer
14 years 2 months ago
A comparison of coordinated planning methods for cooperating rovers
This paper describes and evaluates three methods for coordinating multiple agents. These agents interact in two ways. First, they are able to work together to achieve a common poo...
Steve A. Chien, Anthony Barrett, Tara A. Estlin, G...
AGENTS
1998
Springer
14 years 1 months ago
Competitive Scenarios for Heterogeneous Trading Agents
We present a framework for de ning trading scenarios based on sh market auctions. In these scenarios, agents of arbitrary complexity can participate in electronic auctions under ...
Juan A. Rodríguez-Aguilar, Francisco J. Mar...
SOFSEM
1998
Springer
14 years 1 months ago
Distributed Systems Technology for Electronic Commerce Applications
Abstract. Based on the specific characteristics of electronic commerce (ECommerce) requirements for an adequate system support, this contribution gives an overview of the respectiv...
Winfried Lamersdorf, Michael Merz, M. Tuan Tu
ESORICS
1994
Springer
14 years 1 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen
ACISP
2007
Springer
14 years 1 months ago
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication
We study the multicast stream authentication problem when the communication channel is under control of an opponent who can drop, reorder and inject data packets. In this work, we...
Christophe Tartary, Huaxiong Wang