Sciweavers

1790 search results - page 300 / 358
» On Privacy Models for RFID
Sort
View
156
Voted
ATC
2007
Springer
15 years 9 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 9 months ago
Secure Failure Detection in TrustedPals
We present a modular redesign of TrustedPals, a smartcard-based security framework for solving secure multiparty computation (SMC)[?]. TrustedPals allows to reduce SMC to the probl...
Roberto Cortiñas, Felix C. Freiling, Marjan...
126
Voted
OOPSLA
2005
Springer
15 years 9 months ago
Fortune teller: improving garbage collection performance in server environment using live objects prediction
Currently, the most adopted criterion to invoke garbage collection is heap space exhaustion. In other words, garbage collection is invoked when the heap space (either the entire s...
Feng Xian, Witawas Srisa-an, Hong Jiang
ACMICEC
2004
ACM
128views ECommerce» more  ACMICEC 2004»
15 years 9 months ago
Blind sales in electronic commerce
We start with the usual paradigm in electronic commerce: a consumer who wants to buy from a merchant. However, both parties wish to enjoy maximal privacy. In addition to remaining...
Esma Aïmeur, Gilles Brassard, Flavien Serge M...
132
Voted
SAFECOMP
2004
Springer
15 years 8 months ago
Using Fuzzy Self-Organising Maps for Safety Critical Systems
This paper defines a type of constrained artificial neural network (ANN) that enables analytical certification arguments whilst retaining valuable performance characteristics. ...
Zeshan Kurd, Tim Kelly