Sciweavers

1790 search results - page 269 / 358
» On Privacy Models for RFID
Sort
View
108
Voted
AGENTS
1997
Springer
15 years 7 months ago
Adaptable Local Level Arbitration of Behaviors
During the last few years, and in an attempt to provide an ecient alternative to classical methods to designing robot control structures, the behavior-based approach has emerged....
Mohamed Salah Hamdi, Karl Kaiser
130
Voted
AGENTS
1997
Springer
15 years 7 months ago
A Methodology for Building Believable Social Agents
Believable agents are defined to be interactive versions of quality characters in traditional artistic media like film. Such agents are useful in applications such as interactive ...
W. Scott Neal Reilly
ESORICS
1994
Springer
15 years 7 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen
148
Voted
ESORICS
1994
Springer
15 years 7 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
102
Voted
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
15 years 7 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash