Sciweavers

1161 search results - page 96 / 233
» Group Message Authentication
Sort
View
93
Voted
ISI
2006
Springer
15 years 23 days ago
Content Analysis of Jihadi Extremist Groups' Videos
This paper presents an exploratory study of jihadi extremist groups' videos using content analysis and a multimedia coding tool to explore the types of videos, groups' mo...
Arab Salem, Edna Reid, Hsinchun Chen
89
Voted
CSCW
2012
ACM
13 years 8 months ago
To stay or leave?: the relationship of emotional and informational support to commitment in online health support groups
Today many people with serious diseases use online support groups to seek social support. For these groups to be sustained and effective, member retention and commitment is import...
Yi-Chia Wang, Robert Kraut, John M. Levine
CHI
2006
ACM
16 years 1 months ago
The ChiCI group
This paper describes the work, the vision, and the approach of the Child Computer Interaction (ChiCI) group at the University of Central Lancashire in the UK. This group, formed f...
Janet C. Read, Stuart MacFarlane, Rebecca Kelly, E...
98
Voted
CSFW
2009
IEEE
15 years 7 months ago
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists
Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. ...
Najah Chridi, Mathieu Turuani, Michaël Rusino...
105
Voted
ICDCS
1998
IEEE
15 years 5 months ago
A Suite of Database Replication Protocols based on Group Communication Primitives
This paper proposes a family of replication protocols based on group communication in order to address some of the concerns expressed by database designers regarding existing repl...
Bettina Kemme, Gustavo Alonso