Sciweavers

3451 search results - page 72 / 691
» Collaborative attack modeling
Sort
View
ASIACRYPT
2000
Springer
14 years 1 months ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
ICALT
2008
IEEE
14 years 3 months ago
Designing Collaborative Learning Applications
Future collaborative learning technologies are characterized by the CSCL community as highly malleable and flexible. A promising approach for meeting these expectations is to use ...
Jacques Lonchamp
CSCWD
2006
Springer
14 years 22 days ago
Quantitative Evaluation of Workspace Collaboration
In this paper we propose an analytical approach based on models of human performance to evaluate workspace collaboration. Our results indicate that the approach: 1) facilitates th...
Antonio Ferreira, Pedro Antunes
AIM
2006
13 years 10 months ago
Analysis of collaborative tools usages in heterogeneous contexts
: Situations of collaborative working are more and more complex and various in organizations. Such diversification is little studied in the literature. Researches about "techn...
Ali Ouni, Jean-Claude Bocquet, Daniele Bonnivard
CRIWG
2001
13 years 10 months ago
Integration of Domain-Specific Elements into Visual Language Based Collaborative Environments
This paper presents an approach for the integration of domain related elements and operational semantics into collaborative environments based on visual languages. This integratio...
Niels Pinkwart, Heinz Ulrich Hoppe, Katrin Ga&szli...