Sciweavers

1825 search results - page 299 / 365
» Cryptographic Securities Exchanges
Sort
View
BPM
2007
Springer
118views Business» more  BPM 2007»
15 years 6 months ago
Privacy Preserving Collaborative Business Process Management
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
Sumit Chakraborty, Asim Kumar Pal
CCS
2007
ACM
15 years 6 months ago
A calculus of challenges and responses
er presents a novel approach for concisely abstracting authentication s and for subsequently analyzing those abstractions in a sound manner, i.e., deriving authentication guarante...
Michael Backes, Agostino Cortesi, Riccardo Focardi...
CCS
2007
ACM
15 years 6 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
CCS
2007
ACM
15 years 6 months ago
Asirra: a CAPTCHA that exploits interest-aligned manual image categorization
We present Asirra (Figure 1), a CAPTCHA that asks users to identify cats out of a set of 12 photographs of both cats and dogs. Asirra is easy for users; user studies indicate it c...
Jeremy Elson, John R. Douceur, Jon Howell, Jared S...
CIKM
2005
Springer
15 years 5 months ago
The case for access control on XML relationships
With the emergence of XML as the de facto standard to exchange and disseminate information, the problem of regulating access to XML documents has attracted a considerable attentio...
Béatrice Finance, Saïda Medjdoub, Phil...