Sciweavers

1834 search results - page 327 / 367
» Public Key Cryptography
Sort
View
MP
1998
76views more  MP 1998»
13 years 7 months ago
Warm start of the primal-dual method applied in the cutting-plane scheme
A practical warm-start procedure is described for the infeasible primal-dualinterior-point method employed to solve the restricted master problem within the cutting-plane method. ...
Jacek Gondzio
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
ZMP
2002
148views more  ZMP 2002»
13 years 7 months ago
Effects of Salient News Items on Information Acquisition and Issue Perception
A medical news report was manipulated to project either Alabama or Texas as the target region for the outbreak of a new (fictitious) disease. Residents of Alabama and Texas respond...
Silvia Knobloch, Dolf Zillmann, Rhonda Gibson, Jam...
COMCOM
2008
99views more  COMCOM 2008»
13 years 7 months ago
SPICE: Scalable P2P implicit group messaging
Implicit group messaging (IGM) is a decoupled messaging paradigm for connecting content publishers and consumers over the Internet. Unlike traditional multicast or publish/subscri...
Daniel Cutting, Aaron J. Quigley, Björn Landf...
IFIPTM
2010
145views Management» more  IFIPTM 2010»
13 years 6 months ago
A Formal Notion of Trust - Enabling Reasoning about Security Properties
Historically, various different notions of trust can be found, each addressing particular aspects of ICT systems, e.g. trust in electronic commerce systems based on reputation and...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...