Sciweavers

2714 search results - page 394 / 543
» Under the table interaction
Sort
View
CCS
2005
ACM
15 years 9 months ago
On the cost-ineffectiveness of redundancy in commercial P2P computing
We present a game-theoretic model of the interactions between server and clients in a constrained family of commercial P2P computations (where clients are financially compensated...
Matthew Yurkewych, Brian Neil Levine, Arnold L. Ro...
CRYPTO
2005
Springer
107views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
A Quantum Cipher with Near Optimal Key-Recycling
Abstract. Assuming an insecure quantum channel and an authenticated classical channel, we propose an unconditionally secure scheme for encrypting classical messages under a shared ...
Ivan Damgård, Thomas Brochmann Pedersen 0002...
DSVIS
2005
Springer
15 years 9 months ago
Towards Model Checking Stochastic Aspects of the thinkteam User Interface
Abstract. Stochastic model checking is a recent extension of traditional modelchecking techniques for the integrated analysis of both qualitative and quantitative system properties...
Maurice H. ter Beek, Mieke Massink, Diego Latella
EGC
2005
Springer
15 years 9 months ago
eNANOS Grid Resource Broker
Grid computing has been presented as a way to share geographically and organizationally distributed resources and to perform successfully distributed computation. For achieve this ...
Ivan Rodero, Julita Corbalán, Rosa M. Badia...
ESORICS
2005
Springer
15 years 9 months ago
Quantifying Probabilistic Information Flow in Computational Reactive Systems
Information flow and non-interference are well-established techniques for expressing both integrity and privacy properties. Because of the enormous potential to transmit informati...
Michael Backes