Sciweavers

2702 search results - page 124 / 541
» Message from the Editor
Sort
View
DSS
2002
231views more  DSS 2002»
13 years 10 months ago
Computational aspects of the FLBC framework
Recent research has sought to develop formal languages for business communication as more expressive, flexible and powerful alternatives to current electronic data interchange (ED...
Aspassia Daskalopulu, Marek J. Sergot
TCC
2009
Springer
153views Cryptology» more  TCC 2009»
14 years 10 months ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein
SIGIR
2009
ACM
14 years 4 months ago
It pays to be picky: an evaluation of thread retrieval in online forums
Online forums host a rich information exchange, often with contributions from many subject matter experts. In this work we evaluate algorithms for thread retrieval in a large and ...
Jonathan L. Elsas, Jaime G. Carbonell
SECON
2007
IEEE
14 years 4 months ago
Multi-user Broadcast Authentication in Wireless Sensor Networks
— Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes...
Kui Ren, Wenjing Lou, Yanchao Zhang
HICSS
1996
IEEE
84views Biometrics» more  HICSS 1996»
14 years 2 months ago
The Development of FEDI in Switzerland: A Life-Cycle Approach
Four major Swiss banks have recently introduced a new financial electronic data interchange (FEDI) service based on UN/EDIFACT and are now trying to convince their corporate custo...
Ivo Cathomen, Stefan Klein