Sciweavers

2290 search results - page 105 / 458
» Extensible Protected Types
Sort
View
103
Voted
SPW
2004
Springer
15 years 8 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
ENTCS
2006
122views more  ENTCS 2006»
15 years 2 months ago
Combining Aspect-Oriented and Strategic Programming
Properties such as logging, persistence, debugging, tracing, distribution, performance monitoring and exception handling occur in most programming paradigms and are normally very ...
Karl Trygve Kalleberg, Eelco Visser
126
Voted
CSCWD
2007
Springer
15 years 8 months ago
Digital Identity Design and Privacy Preservation for e-Learning
More and more learners tend to utilise e-learning as their learning platform. The privacy of the users’ digital identities of e-learning has become a big concern. This paper pro...
Jianming Yong
90
Voted
IEPOL
2006
60views more  IEPOL 2006»
15 years 2 months ago
A model of piracy
This paper develops a simple model of software piracy to analyze the short-run effects of piracy on software usage and the long-run effects on development incentives. We consider ...
Sang Hoo Bae, Jay Pil Choi
89
Voted
INSK
2006
53views more  INSK 2006»
15 years 2 months ago
DRM
In this paper we will discuss the effects that digital rights management has upon the music industry. Whether it hinders the consumers experience and whether there is any actual b...