Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols, for instance, coordinate delivery of new values to the participants, i.e., additions to the set of values they possess. An exchange protocol is fair if it ensures that delivery of new values is balanced: If one participant ...Download Now
Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. The authors identify five central principles to guide development of attestation systems. They argue that attestation must be able to deliver temporally fresh evidence; comprehensive information about ...Download Now
Today's battlefield requires agility in a matter of minutes, not hours or days, but there is a critical data sharing gap at the tactical edge. Implementation of the DOD Net-Centric Data Strategy through XML-based data standards is essential to fixing this problem and providing an environment where interoperable data is ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?