Sciweavers

10 search results - page 1 / 2
» imcs 2008
Sort
View
IMCS
2008
58views more  IMCS 2008»
13 years 7 months ago
Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer
Purpose
Yoones Asgharzadeh Sekhavat, Mohammad Fathian
IMCS
2008
62views more  IMCS 2008»
13 years 7 months ago
An exploratory study on systems development methodologies for web-based applications
Purpose
Mohamad Noorman Masrek, Norhayati Hussin, Norashim...
IMC
2009
ACM
14 years 1 months ago
Inside the bird's nest: measurements of large-scale live VoD from the 2008 olympics
Hao Yin, Xuening Liu, Feng Qiu, Ning Xia, Chuang L...
IMC
2009
ACM
14 years 1 months ago
When private keys are public: results from the 2008 Debian OpenSSL vulnerability
We report on the aftermath of the discovery of a severe vulnerability in the Debian Linux version of OpenSSL. Systems affected by the bug generated predictable random numbers, mo...
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon...
IMCS
2007
93views more  IMCS 2007»
13 years 7 months ago
Strategies for successful CRM implementation
Purpose – Customer relationship management (CRM) is an information system that tracks customers’ interactions with the firm and allows employees to instantly pull up informat...
ThuyUyen H. Nguyen, Joseph S. Sherif, Michael Newb...