Sciweavers

ICOIN
2001
Springer
14 years 1 months ago
A Conformance Testing Method for Communication Protocols Modeled as Concurrent DFSMs
According to the progress of high-speed networks, many communication protocols are specified as concurrent systems. Such systems can be modeled as concurrent deterministic FSMs (D...
Atsushi Fukada, Akio Nakata, Junji Kitamichi, Teru...
ICOIN
2001
Springer
14 years 1 months ago
Pervasive Adaptation for Mobile Computing
Mobile Computing platforms such as mobile phones, PDAs or wearable computers operate in a much more volatile and limited environment than their stationary counterparts. Such platf...
Tim Edmonds, Andy Hopper, Steve Hodges
ICOIN
2001
Springer
14 years 1 months ago
Ad Hoc On-Demand Backup Node Setup Routing Protocol
Chi-Ming Chung, Ying-Hong Wang, Chih-Chieh Chuang
ICICS
2001
Springer
14 years 1 months ago
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication
Secure group communication with hierarchical access control refers to a scenario where a group of members is divided into a number of subgroups located at different privilege leve...
Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
ICICS
2001
Springer
14 years 1 months ago
Playing Lottery on the Internet
Jianying Zhou, Chunfu Tan
ICICS
2001
Springer
14 years 1 months ago
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes
Abstract. In this paper, the cryptanalytic strength of two HwangRao Secret Error-Correcting Code (SECC) schemes is examined under a known-plaintext attack. In particular, we found ...
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
ICICS
2001
Springer
14 years 1 months ago
Threshold Undeniable RSA Signature Scheme
Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the concept of this special digital signature ten years ago. Up to now, however, almo...
Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Z...
ICICS
2001
Springer
14 years 1 months ago
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce
Abstract. In electronic commerce, traded digital objects are likely associated with several numerical values as well as their prices. These values may change unpredictably over tim...
Kanta Matsuura
ICICS
2001
Springer
14 years 1 months ago
Fair Electronic Cash Based on a Group Signature Scheme
Several new group signature schemes have been proposed in recent years. In addition, several applications for group signatures (including electronic cash) have been suggested. A ne...
Greg Maitland, Colin Boyd