Sciweavers

592 search results - page 40 / 119
» Competition, Cooperation, and Authorization
Sort
View
IJNSEC
2008
103views more  IJNSEC 2008»
13 years 7 months ago
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the cipher...
Chunxiang Xu, Junhui Zhou, Guozhen Xiao
WWW
2007
ACM
14 years 8 months ago
A content-driven reputation system for the wikipedia
We present a content-driven reputation system for Wikipedia authors. In our system, authors gain reputation when the edits they perform to Wikipedia articles are preserved by subs...
B. Thomas Adler, Luca de Alfaro
SAT
2004
Springer
115views Hardware» more  SAT 2004»
14 years 29 days ago
Full CNF Encoding: The Counting Constraints Case
Abstract. Many problems are naturally expressed using CNF clauses and boolean cardinality constraints. It is generally believed that solving such problems through pure CNF encoding...
Olivier Bailleux, Yacine Boufkhad
ACSC
2004
IEEE
13 years 11 months ago
Establishing Trust In Pure Ad-hoc Networks
An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-or...
Asad Amir Pirzada, Chris McDonald
ECIS
2000
13 years 9 months ago
Citizen Information Services using Internet Technologies
This paper presents a Web-based, database-oriented set of applications, namely "Public Information" and "Electronic Voting", to support information services (ex...
Christos Bouras, Spyridon Kastaniotis, Vassilis Tr...