Sciweavers

169 search results - page 25 / 34
» Trust in e-Government Cooperation
Sort
View
HIPC
2004
Springer
14 years 26 days ago
An Incentive Driven Lookup Protocol for Chord-Based Peer-to-Peer (P2P) Networks
In this paper we describe a novel strategy for carrying out lookups in Chord-based peer-to-peer (P2P) networks, wherein nodes are assumed to behave selfishly. This is in contrast ...
Rohit Gupta, Arun K. Somani
COMPSAC
2002
IEEE
14 years 13 days ago
Multi-Criteria Preference Analysis for Systematic Requirements Negotiation
Many software projects have failed because their requirements were poorly negotiated among stakeholders. This paper proposes a systematic model, called "MultiCriteria Prefere...
Hoh Peter In, David Olson, Tom Rodgers
CEC
2007
IEEE
13 years 11 months ago
Preventing selfish behavior in Ad Hoc networks
Cooperation enforcement is one of the key issues in ad hoc networks. In this paper we proposes a new strategy driven approach that aims at discouraging selfish behavior among netwo...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...
CARDIS
2006
Springer
123views Hardware» more  CARDIS 2006»
13 years 11 months ago
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability
In this paper we propose three smartcard-based variants of anonymous authentication using unique one-time pseudonyms. The first variant can be used to authenticate a user. However,...
Martin Schaffer, Peter Schartner
FC
2000
Springer
119views Cryptology» more  FC 2000»
13 years 11 months ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...