Sciweavers

133 search results - page 16 / 27
» Towards a Game Theoretic View of Secure Computation
Sort
View
ATAL
2005
Springer
14 years 1 months ago
Law-governed Linda as a semantics for agent dialogue protocols
Tuple spaces and the associated Linda language are a popular model for distributed computation, and Law-Governed Linda (LGL) is a variant allowing processes to have differential ...
Sylvie Doutre, Peter McBurney, Michael Wooldridge
DRM
2006
Springer
13 years 11 months ago
Consumers, fans, and control: what the games industry can teach Hollywood about DRM
Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is "restrictive" digital-rights manageme...
Susan Landau, Renée Stratulate, Doug Twille...
ECIS
2003
13 years 9 months ago
Towards an interdisciplinary theory of networks
Research problems in ICT networks often comprise coordination problems of information infrastructures and require state-of-the-art methods of coping with complex system dynamics. ...
Tim Weitzel, Oliver Wendt, Wolfgang König
NDSS
2003
IEEE
14 years 1 months ago
Integrating Security, Mobility and Multi-Homing in a HIP Way
The current trend in mobile networking is towards mobile hosts that have multiple network interfaces, e.g., WLAN and GPRS. However, when the current Internet architecture was orig...
Pekka Nikander, Jukka Ylitalo, Jorma Wall
DAC
2004
ACM
14 years 8 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...