Sciweavers

1181 search results - page 84 / 237
» A New Definition of Creativity
Sort
View
FSE
2009
Springer
136views Cryptology» more  FSE 2009»
14 years 9 months ago
MAC Reforgeability
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
John Black, Martin Cochran
DCC
2008
IEEE
14 years 8 months ago
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also ...
Berkant Ustaoglu
BIS
2008
130views Business» more  BIS 2008»
13 years 10 months ago
Employee Competencies for Business Process Management
Business process management (BPM) is an approach which empowers companies to react flexibly to new market situations. The main goal of BPM is to improve efficiency and effectivenes...
Stefan Eicker, Jessica Kochbeck, Peter M. Schuler
GI
2010
Springer
13 years 7 months ago
Open Innovation Marketing. A Case Study
: Social networks and communities like facebook and myspace gain increasing importance in people's everyday lives. Companies start to see these platforms as a chance for commu...
Catharina van Delden, Nancy Wünderlich
ATAL
2009
Springer
13 years 10 months ago
Conditional Dependence Networks in Requirements Engineering
In this paper we present a new model for the requirements analysis of a system. We offer a conceptual model defined following a visual modeling language, called dependence networks...
Guido Boella, Leendert van der Torre, Serena Villa...