Timestamping Systems / Quorum Systems / Fair Exchange Systems / Software Systems / Threshold Cryptography Systems / State-Machine Replication Systems / Microsoft / Specific Scenarios E-Commerce Systems / /
Country
Turkey / Japan / Israel / / /
Event
Product Issues / FDA Phase / /
Facility
University of Connecticut / USA Tel Aviv University / Ko¸c University / Israel Kyushu University / Shamir Masafumi Yamashita ACM SIGACT News Carleton University / /
IndustryTerm
tamper-resistant smartcard technology / e-commerce protocols / directory services / constant-time distributed algorithm / computation protocols / authentication services / approximation algorithm / certification systems / trusted computing modules / E-commerce systems / distributed computing / non-autonomous solutions / e-auction / finite-state verification tool / wireless networks / distributed systems / approximation algorithms / distributed network algorithms / unstructured wireless multi-hop networks / 2PC protocol / trusted central bank / sensor networks / secret-sharing protocols / byzantine systems / threshold systems / greedy algorithm / reputation systems / non-autonomous distribution systems / e - commerce / strongest known distributed approximation algorithms / electronic commerce / /
OperatingSystem
Mac OS / Linux / BSD / Microsoft Windows / /
Organization
Ko¸c University / University of Connecticut / Kyushu University / Tel Aviv University / Carleton University / Technion / /
Person
David Peleg / Roger Wattenhofer / Roger Wattenhofer Magn / Alexander A. Shvartsman Boaz / Evangelos Kranakis Shay Kutten Alexander / Fabian Kuhn / Stefan Dobrev / /
Position
single virtual player / General / sirocco Local Chair / dealer / /
Product
TTP agent / work / /
ProgrammingLanguage
Java / /
ProvinceOrState
Connecticut / /
Technology
e-commerce protocols / MDS approximation algorithm / Peer-to-Peer / Linux / strongest known distributed approximation algorithms / same tamper-resistant smartcard technology / threshold encryption / operating system / SMPC protocol / peer-to-peer system / operating systems / public key encryption / encryption / cryptography / constant-time distributed algorithm / secret-sharing protocols / Java / finite state machine / Peer to Peer / 2PC protocol / approximation algorithms / exchange protocols / distributed network algorithms / secure two-party computation protocols / /