Sciweavers

1282 search results - page 52 / 257
» Sharing knowledge
Sort
View
IJNSEC
2006
107views more  IJNSEC 2006»
13 years 10 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
PPOPP
2009
ACM
14 years 10 months ago
Software transactional distributed shared memory
We have developed a transaction-based approach to distributed shared memory(DSM) that supports object caching and generates path expression prefetches. A path expression specifies...
Alokika Dash, Brian Demsky
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
14 years 3 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
CHI
2002
ACM
14 years 10 months ago
Workshop: Creating and refining knowledges, identities, and understandings in on-line communities
This two-day workshop examines the ways that on-line communities create and refine their shared resources, including both the formal and observable artifacts (documents, chats, th...
Michael J. Muller, David R. Millen
DEXA
2009
Springer
120views Database» more  DEXA 2009»
14 years 4 months ago
Supporting Personal Semantic Annotations in P2P Semantic Wikis
In this paper, we propose to extend Peer-to-Peer Semantic Wikis with personal semantic annotations. Semantic Wikis are one of the most successful Semantic Web applications. In sema...
Diego Torres, Hala Skaf-Molli, Alicia Díaz,...