Sciweavers

CSE
2009
IEEE
13 years 9 months ago
Social Authentication Protocol for Mobile Phones
Bijan Soleymani, Muthucumaru Maheswaran
CSE
2009
IEEE
13 years 9 months ago
Edge Anonymity in Social Network Graphs
Edges in social network graphs can model sensitive relationships. In this paper, we consider the problem of edges anonymity in graphs. We propose a probabilistic notion of edge ano...
Lijie Zhang, Weining Zhang
CSE
2009
IEEE
13 years 9 months ago
The Influence of Personalities Upon the Dynamics of Trust and Reputation
When an agent resides in a community, the opinion of other community members concerning whether a particular individual is trustworthy or not influences the trust level of this ag...
Mark Hoogendoorn, S. Waqar Jaffry
CSE
2009
IEEE
13 years 9 months ago
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures
Abstract--A widespread design approach in distributed applications based on the service-oriented paradigm, such as web-services, consists of clearly separating the enforcement of a...
Michele Barletta, Silvio Ranise, Luca Viganò...
CSE
2009
IEEE
13 years 9 months ago
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach
Yasuyuki Tsukada, Ken Mano, Hideki Sakurada, Yoshi...
COMPLEX
2009
Springer
13 years 9 months ago
Temperature-Induced Domain Shrinking in Ising Ferromagnets Frustrated by a Long-Range Interaction
Abstract. We investigate a spin model in which a ferromagnetic shortrange interaction competes with a long-range antiferromagnetic interaction decaying spatially as 1 rd+ , d being...
Alessandro Vindigni, Oliver Portmann, Niculin Sara...
ACMSE
2009
ACM
13 years 9 months ago
Semantic web in eHealth
It is getting harder to extract useful information from the enormous amount of data that is being collected in the medical information systems or eHealth systems due to the distri...
Erdogan Dogdu
ACMSE
2009
ACM
13 years 9 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
WG
2010
Springer
13 years 9 months ago
From Path Graphs to Directed Path Graphs
We present a linear time algorithm to greedily orient the edges of a path graph model to obtain a directed path graph model (when possible). Moreover we extend this algorithm to fi...
Steven Chaplick, Marisa Gutierrez, Benjamin L&eacu...
WG
2010
Springer
13 years 9 months ago
Efficient Algorithms for Eulerian Extension
Eulerian extension problems aim at making a given (directed) (multi-)graph Eulerian by adding a minimum-cost set of edges (arcs). These problems have natural applications in schedu...
Frederic Dorn, Hannes Moser, Rolf Niedermeier, Mat...