Sciweavers

90 search results - page 18 / 18
» Electronic Roads in the Information Society
Sort
View
SCFBM
2008
101views more  SCFBM 2008»
13 years 5 months ago
The MERG Suite: Tools for discovering competencies and associated learning resources
Background: As the demands for competency-based education grow, the need for standardsbased tools to allow for publishing and discovery of competency-based learning content is mor...
Ravi Teja Bhupatiraju, William R. Hersh, Valerie S...
TIFS
2010
186views more  TIFS 2010»
13 years 3 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
14 years 1 days ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
SOUPS
2009
ACM
14 years 1 days ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
WPES
2005
ACM
13 years 11 months ago
The privacy cost of the second-chance offer
This paper examines a generalization of a two-stage game common on eBay: an ascending-price auction followed by price discrimination (the second chance offer). High bids in the a...
Sumit Joshi, Yu-An Sun, Poorvi L. Vora