Sciweavers

CCS
1998
ACM
13 years 12 months ago
The Design, Implementation and Operation of an Email Pseudonym Server
Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. Much existing work concentrates on w...
David Mazières, M. Frans Kaashoek
CCS
1998
ACM
13 years 12 months ago
A Practical Secure Physical Random Bit Generator
Markus Jakobsson, Elizabeth A. M. Shriver, Bruce H...
CCS
1998
ACM
13 years 12 months ago
Public-Key Cryptography and Password Protocols
Shai Halevi, Hugo Krawczyk
CCS
1998
ACM
13 years 12 months ago
A Specification of Java Loading and Bytecode Verification
This paper gives a mathematical specification the Java Virtual Machine (JVM) bytecode verifier. The specification is an axiomatic description of the verifier that makes precise su...
Allen Goldberg
CCS
1998
ACM
13 years 12 months ago
A Security Architecture for Computational Grids
State-of-the-art and emerging scientific applications require fast access to large quantities of data and commensurately fast computational resources. Both resources and data are ...
Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven...
CCS
1998
ACM
13 years 12 months ago
Authenticated Group Key Agreement and Friends
Many modern computing environments involve dynamic peer groups. Distributed simulation, multi-user games, conferencing and replicated servers are just a few examples. Given the op...
Giuseppe Ateniese, Michael Steiner, Gene Tsudik
AGENTS
1998
Springer
13 years 12 months ago
Pitfalls of Agent-Oriented Development
While the theoretical and experimental foundations of agent-based systems are becoming increasingly well understood, comparatively little effort has been devoted to understanding ...
Michael Wooldridge, Nicholas R. Jennings
AGENTS
1998
Springer
13 years 12 months ago
A Multiagent Perspective of Parallel and Distributed Machine Learning
Parallel and distributed information processing systems play an increasingly important role in artificial intelligence and computer science. In this article an approach to learnin...
Gerhard Weiß