Sciweavers

980 search results - page 124 / 196
» Analyzing Flickr groups
Sort
View
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 4 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
CSCW
2004
ACM
14 years 4 months ago
Instant messages: a framework for reading between the lines
A framework is described for analyzing keystroke level data from instant messages (IM). This is unlike other analyses of IM which employ server-based logs of messages. This framew...
Jeffrey D. Campbell
PDC
2004
ACM
14 years 4 months ago
The impact of participation in information system design: a comparison of contextual placements
To compare the outcomes of participatory and user-centered contextual design, case study methods and the Activity Checklist derived from Activity Theory are used to analyze two sy...
Magnus Irestig, Henrik Eriksson, Toomas Timpka
WS
2004
ACM
14 years 4 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
CAISE
2004
Springer
14 years 4 months ago
CoDoc: Multi-mode Collaboration over Documents
Abstract. In software engineering as well as in any engineering domain, a way of customizing the collaborative work to various modes of collaboration, i.e. synchronous and asynchro...
Claudia-Lavinia Ignat, Moira C. Norrie