Sciweavers

134 search results - page 8 / 27
» Authentic Third-party Data Publication
Sort
View
ICSM
2009
IEEE
14 years 2 months ago
A statistical examination of the evolution and properties of libre software
How and why does software evolve? This question has been under study since almost 40 years ago, and it is still a subject of controversy. In the seventies, Meir M. Lehman formulat...
Israel Herraiz
WIKIS
2006
ACM
14 years 1 months ago
PoliticWiki: exploring communal politics
This paper describes the methodology and results of an attempt to use a wiki web site for political collaboration. Recruited through gateway contacts for online political organiza...
Kevin Makice

Publication
116views
13 years 7 months ago
Poking Facebook: Characterization of OSN Applications
Facebook is one of the most popular Internet sites today. A key fea- ture that arguably contributed to Facebook's unprecedented success is its application platform, which enab...
Minas Gjoka, Michael Sirivianos, Athina Markopoulo...
SOUPS
2009
ACM
14 years 1 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
13 years 10 months ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...