Sciweavers

610 search results - page 63 / 122
» Predicate-Based Key Exchange
Sort
View
IEEECIT
2010
IEEE
13 years 6 months ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao
IAT
2008
IEEE
14 years 3 months ago
Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making
The recent emergence of location-based social networking services is revolutionizing web-based social networking allowing users to share real-life experiences via geo-tagged user-...
Touhid Bhuiyan, Yue Xu, Audun Jøsang
SASO
2007
IEEE
14 years 3 months ago
Towards Supporting Interactions between Self-Managed Cells
Management in pervasive systems cannot rely on human intervention or centralised decision-making functions. It must be devolved, based on local decision-making and feedback contro...
Alberto E. Schaeffer Filho, Emil C. Lupu, Naranker...
ATAL
2007
Springer
14 years 3 months ago
On the Behavior of Competing Markets Populated by Automated Traders
Abstract. Real market institutions, stock and commodity exchanges for example, do not occur in isolation. Company stock is frequently listed on several stock exchanges, allowing tr...
Jinzhong Niu, Kai Cai, Simon Parsons, Elizabeth Sk...
DNIS
2007
Springer
103views Database» more  DNIS 2007»
14 years 3 months ago
A Formalism for Navigating and Editing XML Document Structure
The use of XML has become pervasive. It is used in a range of data storage and data exchange applications. In many cases such XML data is captured from users via forms or transform...
Frithjof Dau, Mark Sifer