Sciweavers

519 search results - page 28 / 104
» How to make secure email easier to use
Sort
View
66
Voted
OZCHI
2006
ACM
15 years 3 months ago
Socialising across channels: group multichannel communication
People increasingly communicate over multiple channels, such as SMS, email and IM. Choosing the channel for interaction is typically a considered action and shapes the message its...
Clint Heyer, Margot Brereton
ICPP
2006
IEEE
15 years 3 months ago
hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems
The open feature of peer-to-peer systems invites the spread of the malfunctioning data. Additional reputation systems are constructed to guarantee the data authenticity. One chall...
Xiaomei Liu, Li Xiao
TCC
2004
Springer
105views Cryptology» more  TCC 2004»
15 years 3 months ago
Unfair Noisy Channels and Oblivious Transfer
In a paper from EuroCrypt’99, Damg˚ard, Kilian and Salvail show various positive and negative results on constructing Bit Commitment (BC) and Oblivious Transfer (OT) from Unfair...
Ivan Damgård, Serge Fehr, Kirill Morozov, Lo...
SIGSOFT
2010
ACM
14 years 7 months ago
Embracing ambiguity
Software helps people fulfill their goals, but development tools lack understanding of those goals. But if development tools did understand how software artifacts relate to higher...
Kenneth C. Arnold, Henry Lieberman
COMCOM
2006
121views more  COMCOM 2006»
14 years 9 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal