Sciweavers

905 search results - page 159 / 181
» The Case Against Micropayments
Sort
View
WECWIS
2003
IEEE
102views ECommerce» more  WECWIS 2003»
14 years 1 months ago
FUSION: A System Allowing Dynamic Web Service Composition and Automatic Execution
Service portals are systems which expose a bundle of web services to the user, allowing the specification and subsequent execution of complex tasks defined over these individual...
Debra E. VanderMeer, Anindya Datta, Kaushik Dutta,...
ASIACRYPT
2003
Springer
14 years 1 months ago
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes
Abstract. We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS). Broadcast Encryption allows a broadcaster to broadcast an encrypted m...
Nuttapong Attrapadung, Kazukuni Kobara, Hideki Ima...
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
14 years 1 months ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
GECCO
2003
Springer
162views Optimization» more  GECCO 2003»
14 years 1 months ago
Optimization of Spare Capacity in Survivable WDM Networks
A network with restoration capability requires spare capacity to be used in the case of failure. Optimization of spare capacity is to find the minimum amount of spare capacity for ...
H. W. Chong, Sam Kwong
ICS
2003
Tsinghua U.
14 years 1 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...