Sciweavers

3082 search results - page 37 / 617
» its 2004
Sort
View
FSE
2004
Springer
110views Cryptology» more  FSE 2004»
14 years 28 days ago
VMPC One-Way Function and Stream Cipher
Abstract. A simple one-way function along with its proposed application in symmetric cryptography is described. The function is computable with three elementary operations on permu...
Bartosz Zoltak
ECIS
2004
13 years 9 months ago
Bolstering Knowledge Management Systems with Appreciative Inquiry
Both Knowledge Management and Appreciative Inquiry attempt to amplify human and organizational capacities by leveraging the best of each. Whereas knowledge management systems aim ...
Michel Avital
ECIS
2004
13 years 9 months ago
The effect of power on the adoption of interorganizational information systems: The Adoption Position model
The adoption and implementation of interorganizational information systems (IOS) heavily depend upon the trading partner(s) of the focal organization. Power structures have been s...
Akos Nagy
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
13 years 9 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...
ECIS
2001
13 years 9 months ago
The Impact of Social Issues on Internet Policy Making
The advantages that Internet as a new technology offers to business and individuals can't be fully exploited without taking under consideration a number of social issues that...
Anastasia Papazafeiropoulou, Athanasia Pouloudi