Sciweavers

759 search results - page 5 / 152
» What Can Be Implemented Anonymously
Sort
View
HICSS
2010
IEEE
240views Biometrics» more  HICSS 2010»
14 years 4 months ago
Can e-Government Adopters Benefit from a Technology-First Approach? The Case of Egypt Embarking on Service-Oriented Architecture
It seems common sense that “policy matters” in setting up e-government interoperability, mainly because collaboration should be guided by dedicated integration objectives and ...
Ralf Klischewski, Ranwa Abubakr
DELFI
2006
13 years 11 months ago
Mobile Learning is Coming of Age - What we have and what we still miss
: Mobile learning has left the status of a new born child. It is time now to implement some structure into the complex and various activities by a framework presented in this paper...
Dirk Frohberg
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
13 years 11 months ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
ISCN
2006
IEEE
14 years 3 months ago
An optimistic fair e-commerce protocol for large e-goods
Suppose two entities that do not trust each other want to exchange some arbitrary data over a public channel. A fair exchange protocol ensures that both parties get what they want ...
Cagil Can Oniz, Erkay Savas, Albert Levi
ICDCS
2009
IEEE
14 years 7 months ago
Fault-Tolerant Consensus in Unknown and Anonymous Networks
This paper investigates under which conditions information can be reliably shared and consensus can be solved in unknown and anonymous message-passing networks that suffer from cr...
Carole Delporte-Gallet, Hugues Fauconnier, Andreas...