Sciweavers

6137 search results - page 94 / 1228
» Securing Collaborative Applications
Sort
View
CCS
2000
ACM
14 years 1 months ago
Threshold-based identity recovery for privacy enhanced applications
ÈÖ Ú Ý Ò ÓÙÒØ Ð ØÝ Ö ÔÓØ ÒØ ÐÐÝ ÓÒ Ø Ò ÓÖ ¹ Ò Þ Ø ÓÒ Ð Ò Ð Ð Ö ÕÙ Ö Ñ ÒØ× Û Ò ÔÔÖÓ Ý ÐÐÓÛ Ò Ù× Ö× ØÓ Ø Ô× Ù ÓÒ...
Joachim Biskup, Ulrich Flegel
SCN
2008
Springer
13 years 8 months ago
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications
In this paper, we build, in a generic way, two asymmetric cryptosystems with a careful study of their security. We present first an additively homomorphic scheme which generalizes,...
Guilhem Castagnos
EUROPKI
2004
Springer
14 years 2 months ago
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications
Abstract. Besides the pure technical features, the usability of a PKIenabled application plays a crucial role since the best security application will fail in practice if its usabi...
Tobias Straub, Harald Baier
CAISE
1998
Springer
14 years 1 months ago
Document-Centric Groupware for Distributed Governmental Agencies
The distribution of the German government between Bonn and Berlin calls for the technical support for the collaborative document-based tasks performed by inter- and intra-minister...
Daniel A. Tietze, Ajit Bapat, Rolf Reinema
CRIWG
1998
13 years 10 months ago
A Cooperation Model for Teaching/Learning Modeling Disciplines
The use of new technology must be combined with modern teaching practices to be effective. Collaborative learning is a general term employed for a variety of classroom practices d...
Karin Becker, L. Zanella