Sciweavers

609 search results - page 101 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
CAISE
2010
Springer
13 years 8 months ago
Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments
Abstract. Service-oriented applications facilitate the exchange of business services among participants. Existing modeling approaches either apply at a lower of abstraction than re...
Amit K. Chopra, Fabiano Dalpiaz, Paolo Giorgini, J...
ISCA
2008
IEEE
101views Hardware» more  ISCA 2008»
13 years 7 months ago
Scalability in Analyzing the Availability of Large-Scale Networks using Multicast
The goal of this paper is to identify and discuss scalability issues for the measurement-based analysis of the availability in large-scale networks using IP multicast technology. ...
Falko Dressler
CSI
2007
91views more  CSI 2007»
13 years 7 months ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
EOR
2007
104views more  EOR 2007»
13 years 7 months ago
Analysis of the constraint proposal method for two-party negotiations
In the constraint proposal method a mediator locates points at which the two decision makers have joint tangent hyperplanes. We give conditions under which these points are Pareto...
Mitri Kitti, Harri Ehtamo
NRHM
2006
90views more  NRHM 2006»
13 years 7 months ago
Mapping AGROVOC and the Chinese Agricultural Thesaurus: Definitions, tools, procedures
This paper describes the procedures for a concept-based mapping of two agricultural thesauri, the multilingual AGROVOC, created and maintained by the Food and Agricultural Organiz...
Anita C. Liang, Margherita Sini