Sciweavers

1054 search results - page 85 / 211
» group 2005
Sort
View
ATAL
2005
Springer
15 years 10 months ago
Matchmaking multi-party interactions using historical performance data
Matchmaking will be an important component of future agent and agent-like systems, such as the semantic web. Most research on matchmaking has been directed toward sophisticated ma...
David Lambert, David Robertson
CCS
2005
ACM
15 years 10 months ago
A modular correctness proof of IEEE 802.11i and TLS
The IEEE 802.11i wireless networking protocol provides mutual authentication between a network access point and user devices prior to user connectivity. The protocol consists of s...
Changhua He, Mukund Sundararajan, Anupam Datta, An...
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
15 years 10 months ago
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability ...
Tsz Hon Yuen, Victor K. Wei
DIGRA
2005
Springer
15 years 10 months ago
Pretty good for a girl: gender, identity and computer games
Young people’s participation in online digital culture is one of the most efficient means by which they become proficient in the management of Information and Communications Tec...
Catherine Beavis
GCC
2005
Springer
15 years 10 months ago
An Adaptive Service Strategy Based on User Rating in P2P
In order to deal with free riding in P2P system, incentive mechanism or rating system is presented, and each user rating is computed by itself, which causes that some users exagger...
Jianming Fu, Lei Zhang, Weinan Li, Huanguo Zhang