Sciweavers

1777 search results - page 199 / 356
» Programming Cryptographic Protocols
Sort
View
HICSS
2003
IEEE
154views Biometrics» more  HICSS 2003»
14 years 3 months ago
Project JXTA-C: Enabling a Web of Things
The Web, the collection of all devices connected to the Internet, is on the verge of experiencing a massive evolution from a Web of Computers to a Web of Things as new devices suc...
Bernard Traversat, Mohamed Abdelaziz, Dave Doolin,...
ATAL
2003
Springer
14 years 3 months ago
A formal compositional model of multiagent interaction
Interaction protocols for multiagent systems have been described diagrammatically in an extension of UML called AUML (Agent UML). In this paper, we show how to translate these pro...
Sea Ling, Seng Wai Loke
ATAL
2007
Springer
14 years 2 months ago
Temporal linear logic as a basis for flexible agent interactions
Interactions between agents in an open system such as the Internet require a significant degree of flexibility. A crucial aspect of the development of such methods is the notion o...
Duc Quang Pham, James Harland
FSTTCS
2010
Springer
13 years 8 months ago
Lower bounds for Quantum Oblivious Transfer
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic security is impossible, quantum oblivious transfer protocols can limit the disho...
André Chailloux, Iordanis Kerenidis, Jamie ...
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
14 years 11 months ago
Secure Enterprise Services Consumption for SaaS Technology Platforms
Over recent years there has been increased level of discussion on utility pricing for software. The focus of these discussions is to create new operating cost models where the unit...
Yücel Karabulut, Ike Nassi