Sciweavers

ECR
2006
48views more  ECR 2006»
13 years 3 months ago
Non-public and public online community participation: Needs, attitudes and behavior
Blair Nonnecke, Dorine Andrews, Jenny Preece
ECR
2006
52views more  ECR 2006»
13 years 3 months ago
Security requirement analysis of business processes
Peter Herrmann, Gaby Herrmann
ECR
2006
107views more  ECR 2006»
13 years 3 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
ECR
2006
74views more  ECR 2006»
13 years 3 months ago
Effect of technological breakthroughs on electronic markets
Xiaotong Li, Jatinder N. D. Gupta, James V. Koch
ECR
2006
60views more  ECR 2006»
13 years 3 months ago
Editors' note
Mark Ginsburg, Petra Schubert
ECR
2006
81views more  ECR 2006»
13 years 3 months ago
Reputation management and signature delegation: A distributed approach
In this paper, we present a novel protocol, called Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) protocol, to allow an agent owner to securely distrib...
Omaima Bamasak, Ning Zhang
ECR
2006
67views more  ECR 2006»
13 years 3 months ago
An in-depth analysis of information markets with aggregate uncertainty
Yiling Chen, Tracy Mullen, Chao-Hsien Chu