Sciweavers

2421 search results - page 183 / 485
» Message from the Co-Chairs
Sort
View
ECSCW
2007
13 years 11 months ago
Bringing Round-Robin Signature to Computer-Mediated Communication
In computer-mediated group communication, anonymity enables participants to post controversial comments without risking accusations of improper behavior. While this may encourage m...
Takeshi Nishida, Takeo Igarashi
IC
2008
13 years 11 months ago
Generating Web Monitors
- A web monitor is a program used to monitor some public HTML-based Internet information available from dynamic HTML documents on the Internet based on a user defined set of criter...
Nader Mohamed, Ahlam Romaithi, Eiman Samahi, Maith...
ICISC
2007
152views Cryptology» more  ICISC 2007»
13 years 11 months ago
Analysis of Multivariate Hash Functions
We analyse the security of new hash functions whose compression function is explicitly defined as a sequence of multivariate equations. First we prove non-universality of certain ...
Jean-Philippe Aumasson, Willi Meier
MASCOTS
2008
13 years 11 months ago
Taxis: Scalable Strong Anonymous Communication
Anonymity protocols are a privacy-enhancing technology for Internet-based communication. Two important characteristics of anonymity protocols are the strength of anonymity provide...
Andreas Hirt, Michael J. Jacobson Jr., Carey L. Wi...
ACE
2004
207views Education» more  ACE 2004»
13 years 11 months ago
Teaching Java First: Experiments with a Pigs-Early Pedagogy
This paper introduces PigWorld, a tool for teaching Java to novice programmers, via the objects-early style. Three design guidelines forobject-early assignments are discussed: (1)...
Raymond Lister