Sciweavers

818 search results - page 112 / 164
» An Internet Voting System Supporting User Privacy
Sort
View
SIGMOD
2005
ACM
136views Database» more  SIGMOD 2005»
14 years 9 months ago
Peer-to-peer management of XML data: issues and research challenges
Peer-to-peer (p2p) systems are attracting increasing attention as an efficient means of sharing data among large, diverse and dynamic sets of users. The widespread use of XML as a...
Georgia Koloniari, Evaggelia Pitoura
ISN
1998
Springer
14 years 15 days ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
NDSS
2007
IEEE
14 years 3 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
CCR
2007
119views more  CCR 2007»
13 years 9 months ago
Exploiting KAD: possible uses and misuses
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating ...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
ECTEL
2007
Springer
13 years 10 months ago
E-Learning on the Social Semantic Information Sources
Abstract. E-Learning grows on the fertile soil of the Internet technologies; it fails, however, to reach their full potential. With new, emerging technologies of the second generat...
Sebastian Ryszard Kruk, Adam Gzella, Jaroslaw Dobr...