Sciweavers

648 search results - page 21 / 130
» The GCHQ Protocol and Its Problems
Sort
View
KIVS
2005
Springer
14 years 2 months ago
Revenue Maximisation in Peer-to-Peer Networks
: BitTorrent is a peer-to-peer (p2p) protocol for file-sharing. Its improvement over other file-sharing protocols is its tit-for-tat strategy to decide to whom a peer should uplo...
Kolja Eger, Ulrich Killat
INFOCOM
2010
IEEE
13 years 7 months ago
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping
Abstract—With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are hig...
Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu
CERA
2004
89views more  CERA 2004»
13 years 8 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
JBCS
2010
89views more  JBCS 2010»
13 years 3 months ago
Multicoordinated agreement for groups of agents
Agents in agreement protocols play well distinct roles. Proposers propose values to the acceptors, which will accept proposals and inform the learners so they detect that an agree...
Lásaro J. Camargos, Rodrigo Schmidt, Edmund...
ACMDIS
2000
ACM
14 years 1 months ago
On the Contributions of Different Empirical Data in Usability Testing
Many sources of empirical data can be used to evaluate an interface (e.g., time to learn, time to perform benchmark tasks, number of errors on benchmark tasks, answers on question...
Maria Ebling, Bonnie E. John