Sciweavers

610 search results - page 64 / 122
» Predicate-Based Key Exchange
Sort
View
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
14 years 2 months ago
The Impact of Social Types within Information Communities: Findings from Technical Newsgroups
We explored whether Fisher and Durrance’s [11] framework of information communities applies to online technical newsgroups and the impact of particular social types on informati...
Tammara Combs Turner, Karen E. Fisher
CSFW
2005
IEEE
14 years 2 months ago
Game-Based Analysis of Denial-of-Service Prevention Protocols
Availability is a critical issue in modern distributed systems. While many techniques and protocols for preventing denial of service (DoS) attacks have been proposed and deployed ...
Ajay Mahimkar, Vitaly Shmatikov
ATAL
2005
Springer
14 years 2 months ago
Formalizing and achieving multiparty agreements via commitments
Multiparty agreements often arise in a multiagent system where autonomous agents interact with each other to achieve a global goal. Multiparty agreements are traditionally represe...
Feng Wan, Munindar P. Singh
FC
2005
Springer
149views Cryptology» more  FC 2005»
14 years 2 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
ER
2004
Springer
219views Database» more  ER 2004»
14 years 2 months ago
An Agent-Based Approach for Interleaved Composition and Execution of Web Services
The emerging paradigm of web services promises to bring to distributed computing the same flexibility that the web has brought to the publication and search of information contain...
Xiaocong Fan, Karthikeyan Umapathy, John Yen, Sand...