Sciweavers

709 search results - page 64 / 142
» An Equational Theory for Transactions
Sort
View
ICALT
2006
IEEE
15 years 5 months ago
Social Software and the Emergence of Control
Social software, such as blogs, wikis, tagging systems and collaborative filters, treats the group as a first-class object within the system. Drawing from theories of transactiona...
Jon Dron
ASIACRYPT
2008
Springer
15 years 1 months ago
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
In this paper, we show that two variants of Stern's identification scheme [IEEE Transaction on Information Theory '96] are provably secure against concurrent attack unde...
Akinori Kawachi, Keisuke Tanaka, Keita Xagawa
JECR
2002
136views more  JECR 2002»
14 years 11 months ago
Business-to-Business Electronic Commerce Marketplaces: The Alliance Process
Based on ethnographic studies of two business-to-business (B2B) electronic commerce (EC) marketplaces and a review of interorganizational relationship literature, this paper propo...
Hope Koch
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
15 years 5 months ago
CRM and Customer Portfolio Management for E-Tailers
“Don’t put all your eggs in one basket” is common wisdom with respect to financial portfolio theory. The configuration of customer portfolios with regard to appropriate risk...
Dennis Kundisch, Stefan Sackmann, Markus Ruch
WPES
2003
ACM
15 years 4 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...