Elliptic curves with small embedding degree and large prime-order subgroup are key ingredients for implementing pairingbased cryptographic systems. Such “pairing-friendly” curv...
Abstract: Preference elicitation is often used in e-services to create product recommendations for their customers. We present an approach for applying preference elicitation techn...
In this paper, we analyze the term ”prospective design” from various perspectives. The theoretical-, research- and empirical-based approximations are centralized. Furthermore, ...
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
: Web usage mining has been much concentrated on the discovery of relevant user behaviours from Web access record data. In this paper, we present WebUser, an approach to discover u...