Sciweavers

917 search results - page 53 / 184
» What Context Matters
Sort
View
ACNS
2006
Springer
92views Cryptology» more  ACNS 2006»
14 years 1 months ago
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing
The visual secret sharing (VSS for short) scheme is a secret image sharing scheme. A secret image is visually revealed from overlapping shadow images without additional computation...
Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen
ACMICEC
2006
ACM
186views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
Distrust and trust in B2C e-commerce: do they differ?
Researchers have not studied e-commerce distrust as much as ecommerce trust. This study examines whether trust and distrust are distinct concepts. If trust and distrust are the sa...
D. Harrison McKnight, Vivek Choudhury
SC
2005
ACM
14 years 1 months ago
Scheduling speculative tasks in a compute farm
Users often behave speculatively, submitting work that initially they do not know is needed. Farm computing often consists of single node speculative tasks issued by, e.g., bioinf...
David Petrou, Garth A. Gibson, Gregory R. Ganger
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
14 years 1 months ago
Thompson's Group and Public Key Cryptography
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established prot...
Vladimir Shpilrain, Alexander Ushakov
CIKM
2005
Springer
14 years 1 months ago
On reducing redundancy and improving efficiency of XML labeling schemes
The basic relationships to be determined in XML query processing are ancestor-descendant (A-D), parent-child (P-C), sibling and ordering relationships. The containment labeling sc...
Changqing Li, Tok Wang Ling, Jiaheng Lu, Tian Yu