Sciweavers

2421 search results - page 63 / 485
» Message from the Editor-in-Chief
Sort
View
IEEESCC
2007
IEEE
14 years 2 months ago
Deriving executable BPEL from UMM Business Transactions
UN/CEFACT’s Modeling Methodology (UMM) is a UML profile for modeling global B2B choreographies. The basic building blocks of UMM are business transactions, which describe the e...
Birgit Hofreiter, Christian Huemer, Philipp Liegl,...
CIS
2004
Springer
14 years 1 months ago
General Public Key m-Out-of-n Oblivious Transfer
Abstract. In the m-out-of-n oblivious transfer model, Alice has n messages, Bob has m choices. After the interaction between the two parties, Bob can get m but only m messages from...
Zhide Chen, Hong Zhu
EUROMICRO
2006
IEEE
14 years 1 months ago
From PRIMI to PRIMIFaces: Technical Concepts for Selective Information Disclosure
Instant messaging platforms facilitate coordination in workgroups by providing users with mutual information on their presence and availability, allowing for ad-hoc conversations ...
Tom Gross, Christoph Oemig
COST
2008
Springer
99views Multimedia» more  COST 2008»
13 years 9 months ago
From Extensity to Protensity in CAS: Adding Sounds to Icons
Abstract. Being aware of the gap between technological offers and user expectations, the paper aims to illustrate the necessity of anthropocentric designs ("user-pulled")...
Alina E. Lascu, Alexandru V. Georgescu
IACR
2011
132views more  IACR 2011»
12 years 7 months ago
Homomorphic encryption from codes
We propose a new homomorphic encryption scheme based on the hardness of decoding under independent random noise from certain affine families of codes. Unlike in previous latticeba...
Andrej Bogdanov, Chin Ho Lee