Sciweavers

AGENTS
2001
Springer
14 years 4 days ago
Vicious strategies for Vickrey auctions
We show that the Vickrey auction, despite its theoretical benefits, is inappropriate if “antisocial” agents participate in the auction process. More specifically, an antisoc...
Felix Brandt, Gerhard Weiß
AGENTS
2001
Springer
14 years 4 days ago
Some thoughts on agent trust and delegation
In this paper, we are going to show how to build up agentoriented Public Key Infrastructure(PKI) from SPKI/SDSI and X.509 standards. A variety of delegation mechanisms for agents ...
Yuh-Jong Hu
AGENTS
2001
Springer
14 years 4 days ago
A multi-agent system for automated genomic annotation
Massive amounts of raw data are currently being generated by biologists while sequencing organisms. Outside of the largest, high-pro le projects such as the Human Genome Project, ...
Keith Decker, Xiaojing Zheng, Carl Schmidt
ACISP
2001
Springer
14 years 4 days ago
Elliptic Curve Cryptography on a Palm OS Device
The market for Personal Digital Assistants (PDA) is growing rapidly and PDAs are becoming increasingly interesting for commercial transactions. One requirement for further growing ...
André Weimerskirch, Christof Paar, Sheuelin...
ACISP
2001
Springer
14 years 4 days ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
ACISP
2001
Springer
14 years 4 days ago
Improved Cryptanalysis of the Self-Shrinking Generator
Erik Zenner, Matthias Krause, Stefan Lucks
ACISP
2001
Springer
14 years 4 days ago
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
Abstract. At ACISP 2000, Yoo et al proposed a fast public key cryptosystem using matrices over a ring. The authors claim that the security of their system is based on the RSA probl...
Amr M. Youssef, Guang Gong
ACISP
2001
Springer
14 years 4 days ago
On Classifying Conference Key Distribution Protocols
In this paper, we examine a classification of conference key distribution protocols proposed in [4] and show that no known protocol satisfies the security requirements in class 4...
Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Su...
ACISP
2001
Springer
14 years 4 days ago
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks
DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson
ACISP
2001
Springer
14 years 4 days ago
A Practical English Auction with One-Time Registration
An English auction is the most familiar type of auctions. Generally, an electronic auction has mainly two entities, the registration manager(RM) who treats the registration of bidd...
Kazumasa Omote, Atsuko Miyaji