Sciweavers

328 search results - page 41 / 66
» On the Enactability of Business Protocols
Sort
View
WECWIS
2005
IEEE
116views ECommerce» more  WECWIS 2005»
14 years 3 months ago
Security and Privacy Using One-Round Zero-Knowledge Proofs
A zero-knowledge proof (ZKP) is an interactive proof that allows a prover to prove the knowledge of a secret to a verifier without revealing it. ZKPs are powerful tools to deal wi...
Sultan Almuhammadi, Clifford Neuman
CONCUR
2010
Springer
13 years 10 months ago
Trust in Anonymity Networks
Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusi...
Vladimiro Sassone, Sardaouna Hamadou, Mu Yang
MONET
2002
117views more  MONET 2002»
13 years 9 months ago
A Service Management Framework for M-Commerce Applications
Mobile commerce (m-commerce) refers to an ability to conduct wireless commerce transactions using mobile applications in mobile devices. M-commerce applications can range from as s...
Gary Shih, Simon S. Y. Shim
VTC
2010
IEEE
107views Communications» more  VTC 2010»
13 years 8 months ago
Contention-Based Neighborhood Estimation
—This paper proposes a probabilistic technique that enables a node to estimate the number of its neighbors that fulfill certain criteria. The technique does not require any a pr...
Helmut Adam, Evsen Yanmaz, Wilfried Elmenreich, Ch...
CAISE
2004
Springer
14 years 3 months ago
Moda-ML: Building a Collaborative Sectoral Framework based on ebXML
Inter-company data interchange within a specific industrial sector is necessarily based on standard document formats, structures, and transmission protocols. In this perspective, t...
Nicola Gessa, Piero De Sabbata, Massimo Marzocchi,...