Sciweavers

920 search results - page 144 / 184
» Selecting Secure Passwords
Sort
View
AIS
2004
Springer
14 years 1 months ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim
ASIACRYPT
2004
Springer
14 years 1 months ago
Higher Order Universal One-Way Hash Functions
Universal One-Way Hash Functions (UOWHFs) are families of cryptographic hash functions for which first a target input is chosen and subsequently a key which selects a member from ...
Deukjo Hong, Bart Preneel, Sangjin Lee
FC
2004
Springer
75views Cryptology» more  FC 2004»
14 years 1 months ago
Peppercoin Micropayments
Abstract. We present the “Peppercoin” method for processing micropayments efficiently. With this method, a fraction of the micropayments received are determined, via a procedur...
Ronald L. Rivest
ATAL
2003
Springer
14 years 1 months ago
Emergent properties of referral systems
Agents must decide with whom to interact, which is nontrivial when no central directories are available. A classical decentralized approach is referral systems, where agents adapt...
Pinar Yolum, Munindar P. Singh
BIRTHDAY
2003
Springer
14 years 1 months ago
A Formal Basis for Reasoning on Programmable QoS
Abstract. The explicit management of Quality of Service (QoS) of network connectivity, such as, e.g., working cost, transaction support, and security, is a key requirement for the ...
Rocco De Nicola, Gian Luigi Ferrari, Ugo Montanari...