Sciweavers

610 search results - page 72 / 122
» Predicate-Based Key Exchange
Sort
View
ATAL
2006
Springer
14 years 16 days ago
Trust and honour in information-based agency
An argumentation based negotiation model is supported by information theory. Argumentative dialogues change the models of agents with respect to ongoing relationships between them...
Carles Sierra, John K. Debenham
CANS
2006
Springer
83views Cryptology» more  CANS 2006»
14 years 16 days ago
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Abstract. Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short ...
Sven Laur, Kaisa Nyberg
FC
2006
Springer
99views Cryptology» more  FC 2006»
14 years 14 days ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
ISN
2000
Springer
127views Communications» more  ISN 2000»
14 years 11 days ago
Supporting Advanced Multimedia Telecommunications Services Using the Distributed Component Object Model
The demand for a great variety of sophisticated telecommunications services with multimedia characteristics is increasing. This trend highlights the need for the efficient creation...
Dionisis X. Adamopoulos, George Pavlou, Constantin...
IPMU
2010
Springer
13 years 10 months ago
On Nonparametric Predictive Inference for Ordinal Data
Abstract. Nonparametric predictive inference (NPI) is a powerful frequentist statistical framework based only on an exchangeability assumption for future and past observations, mad...
Frank P. A. Coolen, Pauline Coolen-Schrijner, Taha...