Sciweavers

118 search results - page 22 / 24
» Security, Liberty, and Electronic Communications
Sort
View
MUM
2005
ACM
138views Multimedia» more  MUM 2005»
14 years 4 months ago
Group-based content push with dynamic session startup
This paper proposes an intelligent mobile middleware utilizing group-based content push with dynamic session startup and plugand-play features. Solution enhances the distribution ...
Otso Kassinen, Timo Koskela, Erkki Harjula, Jussi ...
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
14 years 4 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
SIGECOM
2004
ACM
77views ECommerce» more  SIGECOM 2004»
14 years 4 months ago
Stopping outgoing spam
We analyze the problem of preventing outgoing spam. We show that some conventional techniques for limiting outgoing spam are likely to be ineffective. We show that while imposing...
Joshua T. Goodman, Robert Rounthwaite
WMCSA
2003
IEEE
14 years 4 months ago
Web Services on Mobile Devices - Implementation and Experience
Web Services have started to appear on servers as interfaces between business-to-business applications. To date, mobile devices have only consumed Web Services running on stationa...
Stefan Berger, Scott McFaddin, Chandrasekhar Naray...
IJNSEC
2011
110views more  IJNSEC 2011»
13 years 5 months ago
An Anonymous Auction Protocol Based on GDH Assumption
The popularization and conveniences of Internet have changed traditional auction transactions into electronic auction via Internet. In 2006, Chang and Chang proposed an anonymous ...
Fuw-Yi Yang, Cai-Ming Liao