Sciweavers

1988 search results - page 276 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
136
Voted
WWW
2005
ACM
16 years 3 months ago
An abuse-free fair contract signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
122
Voted
TIFS
2010
186views more  TIFS 2010»
15 years 26 days ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
SASN
2004
ACM
15 years 8 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
IPPS
2002
IEEE
15 years 7 months ago
Semi-User-Level Communication Architecture
This paper introduces semi-user-level communication architecture, a new high-performance light-weighted communication architecture for inter-node communication of clusters. Differ...
Dan Meng, Jie Ma, Jin He, Limin Xiao, Zhiwei Xu
GCC
2003
Springer
15 years 7 months ago
Research and Design of Remote Education System Based on CSCW
Guided by the cooperation theory, this paper puts forward an interactive and cooperative learning environment design that is based on the self-learning mode and cooperative learnin...
Chunzhi Wang, Miao Shao, Jing Xia, Huachao Chen