Sciweavers

1737 search results - page 39 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
SIGCOMM
1998
ACM
14 years 2 days ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
AXMEDIS
2006
IEEE
238views Multimedia» more  AXMEDIS 2006»
14 years 1 months ago
The Use of Incentive Mechanisms in Multi-Channel Mobile Music Distribution
The music industry is planning to perform a significant shift toward the digital world by partnering cellphone network operators to build a mobile music market. In this paper we ...
Marco Furini, Manuela Montangero
HPCC
2007
Springer
14 years 2 months ago
Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks
In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layerstructure and the choosing of clusterhead...
Qiang Zhang, Guangming Hu, Zhenghu Gong
CSFW
2005
IEEE
14 years 1 months ago
Compositional Analysis of Contract Signing Protocols
We develop a general method for proving properties of contract-signing protocols using a specialized protocol logic. The method is applied to the Asokan-ShoupWaidner and the Garay...
Michael Backes, Anupam Datta, Ante Derek, John C. ...
ACSW
2006
13 years 9 months ago
Formal analysis of card-based payment systems in mobile devices
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment p...
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Hu...