Sciweavers

2601 search results - page 13 / 521
» Secure Rewarding Schemes
Sort
View
IPL
2002
79views more  IPL 2002»
13 years 7 months ago
A self-adjusting quality of service control scheme
We propose and analyze a self-adjusting Quality of Service (QoS) control scheme with the goal of optimizing the system reward as a result of servicing different priority clients w...
Sheng-Tzong Cheng, Ing-Ray Chen
TC
2008
13 years 7 months ago
On the Computational Security of a Distributed Key Distribution Scheme
In a distributed key distribution scheme, a set of servers help a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some server...
Vanesa Daza, Javier Herranz, Germán S&aacut...
ASIACRYPT
2004
Springer
14 years 25 days ago
On Provably Secure Time-Stamping Schemes
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the underlying hash function is collisionresistant but still no rigorous proofs have...
Ahto Buldas, Märt Saarepera
WPES
2005
ACM
14 years 29 days ago
Quantitative evaluation of unlinkable ID matching schemes
Yasunobu Nohara, Sozo Inoue, Kensuke Baba, Hiroto ...
ETT
2000
149views Education» more  ETT 2000»
13 years 7 months ago
Channel Allocation with Recovery Strategy in Wireless Networks
With the increasing penetration of wireless communications systems, customers are expecting the same level of service, reliability and performance from the wireless communication s...
Yue Ma, James J. Han, Kishor S. Trivedi