Sciweavers

25137 search results - page 4996 / 5028
» Self-healing Information Systems
Sort
View
JUCS
2008
156views more  JUCS 2008»
13 years 9 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
JUCS
2008
113views more  JUCS 2008»
13 years 9 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
JUCS
2008
123views more  JUCS 2008»
13 years 9 months ago
Beyond ASCII - Parsing Programs with Graphical Presentations
: Proxima is a generic structure editor suitable for a wide range of structured document types. It allows edit operations on the document structure as well as on its screen represe...
Martijn M. Schrage, S. Doaitse Swierstra
ECRA
2007
141views more  ECRA 2007»
13 years 9 months ago
A growth theory perspective on B2C e-commerce growth in Europe: An exploratory study
Information and communication technologies (ICTs) continue to have a profound effect on the economies and societies where they are used. In this article, we propose three related...
Shuchun Ho, Robert J. Kauffman, Ting-Peng Liang
KI
2008
Springer
13 years 9 months ago
On Restaurants and Requirements: How Requirements Engineering may be Facilitated by Scripts
Requirements engineering is a central part of software projects. It is assumed that two third of all errors in software projects are caused by forgotten requirements or mutual misu...
Christoph Peylo
« Prev « First page 4996 / 5028 Last » Next »