Sciweavers

1663 search results - page 107 / 333
» Computer Security in the Real World
Sort
View
135
Voted
APPROX
2010
Springer
139views Algorithms» more  APPROX 2010»
15 years 5 months ago
Two-Source Extractors Secure against Quantum Adversaries
We initiate the study of multi-source extractors in the quantum world. In this setting, our goal is to extract random bits from two independent weak random sources, on which two q...
Roy Kasher, Julia Kempe
ICDE
2006
IEEE
161views Database» more  ICDE 2006»
15 years 9 months ago
Reputation Lending for Virtual Communities
Reputation management schemes have recently emerged as a mechanism for improving trust and security in peer-topeer networks. A new entrant in a network with reputation management ...
Anurag Garg, Alberto Montresor, Roberto Battiti
EEE
2004
IEEE
15 years 7 months ago
A Privacy-Friendly Loyalty System for Electronic Marketplaces
Loyalty systems provide an interesting possibility for vendors in customer relationship management. This holds for both real world and online vendors. Beside potential benefits of...
Matthias Enzmann, Markus Schneider 0002
ESWS
2006
Springer
15 years 7 months ago
Semantic Web Policies - A Discussion of Requirements and Research Issues
Policies are pervasive in web applications. They play crucial roles in enhancing security, privacy and usability of distributed services. There has been extensive research in the a...
Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, ...
113
Voted
CLEIEJ
2007
86views more  CLEIEJ 2007»
15 years 3 months ago
Requirements Game: Teaching Software Project Management
: Several business areas, like Management and Negotiation, have used games like a didactic way to simulate world reality, to introduce students to the day-to-day generated problems...
Carlos Mario Zapata Jaramillo, Gabriel Awad-Aubad