Sciweavers

703 search results - page 98 / 141
» Fundamentals of Session Types
Sort
View
AES
2004
Springer
151views Cryptology» more  AES 2004»
15 years 3 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
AH
2004
Springer
15 years 3 months ago
Developing Active Learning Experiences for Adaptive Personalised eLearning
Developing adaptive, rich-media, eLearning courses tends to be a complex, highly-expensive and time-consuming task. A typical adaptive eLearning course will involve a multi-skilled...
Declan Dagger, Vincent P. Wade, Owen Conlan
ISI
2004
Springer
15 years 3 months ago
Aligning Simulation Models of Smallpox Outbreaks
We aligned two fundamentally different models of smallpox transmission after a bioterrorist attack: A location-explicit multi-agent model (BioWar) and the conventional epidemiologi...
Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Ka...
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
15 years 3 months ago
The Transitional Role of Institutional Trust in Online Interorganizational Relationships
Given the uncertainty of the online environment, institutional trust is fundamental in building and retaining online interorganizational relationships. The authors propose two typ...
Paul A. Pavlou, Yao-Hua Tan, David Gefen
NSPW
2003
ACM
15 years 3 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim