Sciweavers

1988 search results - page 276 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
WWW
2005
ACM
14 years 9 months ago
An abuse-free fair contract signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
TIFS
2010
186views more  TIFS 2010»
13 years 7 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
SASN
2004
ACM
14 years 2 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
IPPS
2002
IEEE
14 years 2 months ago
Semi-User-Level Communication Architecture
This paper introduces semi-user-level communication architecture, a new high-performance light-weighted communication architecture for inter-node communication of clusters. Differ...
Dan Meng, Jie Ma, Jin He, Limin Xiao, Zhiwei Xu
GCC
2003
Springer
14 years 2 months ago
Research and Design of Remote Education System Based on CSCW
Guided by the cooperation theory, this paper puts forward an interactive and cooperative learning environment design that is based on the self-learning mode and cooperative learnin...
Chunzhi Wang, Miao Shao, Jing Xia, Huachao Chen