Sciweavers

1039 search results - page 100 / 208
» networks 1998
Sort
View
EUROCRYPT
1998
Springer
14 years 1 months ago
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack is a requirement. However, prior to the results presented here, there ap...
Victor Shoup, Rosario Gennaro
NDSS
1998
IEEE
14 years 1 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
TSMC
1998
132views more  TSMC 1998»
13 years 8 months ago
Decision support for vehicle dispatching using genetic programming
—Vehicle dispatching consists of allocating real-time service requests to a fleet of moving vehicles. In this paper, each vehicle is associated with a vector of attribute values...
Ilham Benyahia, Jean-Yves Potvin
ICNP
1998
IEEE
14 years 1 months ago
A Definition of General Weighted Fairness and its Support in Explicit Rate Switch Algorithms
In this paper we give a general definition of weighted fairness and discuss how a pricing policy can be mapped to general weighted (GW) fairness. The GW fairness can be achieved b...
Bobby Vandalore, Sonia Fahmy, Raj Jain, Rohit Goya...
ISWC
1998
IEEE
14 years 1 months ago
Development of a Commercially Successful Wearable Data Collection System
Symbol Technologies has completed a unique accomplishment; it has created a commercially successful Wearable Computer. The success of this product is directly due to a structured ...
Robert Stein, Stephen Ferrero, Margaret Hetfield, ...