Sciweavers

2421 search results - page 189 / 485
» Message from the Co-Chairs
Sort
View
JCS
2006
91views more  JCS 2006»
13 years 9 months ago
A survey of algebraic properties used in cryptographic protocols
Abstract: Cryptographic protocols are successfully analyzed using formal methods. However, formal approaches usually consider the encryption schemes as black boxes and assume that ...
Véronique Cortier, Stéphanie Delaune...
JSW
2008
89views more  JSW 2008»
13 years 9 months ago
Secure Set Union and Bag Union Computation for Guaranteeing Anonymity of Distrustful Participants
Abstract-- The computation of the union operator for different distributed datasets involves two challenges when participants are curious and can even act malicious: guaranteeing a...
Stefan Böttcher, Sebastian Obermeier
ENTCS
2007
94views more  ENTCS 2007»
13 years 9 months ago
A Distributed Implementation of Mobile Maude
We present a new specification/implementation of the mobile agent language Mobile Maude. This new version uses the external sockets provided by Maude since its 2.2 version, thus ...
Francisco Durán, Adrián Riesco, Albe...
PC
2008
158views Management» more  PC 2008»
13 years 9 months ago
Application of multistage stochastic programs solved in parallel in portfolio management
We present a multistage model for allocation of financial resources to bond indices in different currencies. The model was tested on historical data of interest and exchange rates...
Mária Lucká, Igor Melichercik, Ladis...
PERCOM
2008
ACM
13 years 9 months ago
Peer-to-Peer Context Reasoning in Pervasive Computing Environments
In this paper, we propose a peer-to-peer approach to derive and obtain additional context data from lowlevel context data that may be spread over multiple domains in pervasive com...
Tao Gu, Hung Keng Pung, Daqing Zhang