Sciweavers

2454 search results - page 322 / 491
» Privacy in the Information and Communications Technologies
Sort
View
IH
1999
Springer
15 years 6 months ago
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast
Abstract. Traditionally, cryptographic protocols are described as a sequence of steps, in each of which one principal sends a message to another. It is assumed that the fundamental...
Frank Stajano, Ross J. Anderson
VISUAL
1999
Springer
15 years 6 months ago
From Gaze to Focus of Attention
Identifying human gaze or eye-movement ultimately serves the purpose of identifying an individual’s focus of attention. The knowledge of a person’s object of interest helps us...
Rainer Stiefelhagen, Michael Finke, Jie Yang, Alex...
CAISE
1998
Springer
15 years 6 months ago
Document-Centric Groupware for Distributed Governmental Agencies
The distribution of the German government between Bonn and Berlin calls for the technical support for the collaborative document-based tasks performed by inter- and intra-minister...
Daniel A. Tietze, Ajit Bapat, Rolf Reinema
COOPIS
1997
IEEE
15 years 5 months ago
A Distributed Execution Environment for Large-Scale Workflow Management Systems with Subnets and Server Migration
If the number of users within a workjlow management system (WFMS) increases, a central workflow server (WFserver) and a single local area network (LAN) may become overloaded. The ...
Thomas Bauer, Peter Dadam
ISW
1997
Springer
15 years 5 months ago
Threshold Proxy Signature Schemes
This paper will show that Hsu and Wu’s efficient nonrepudiable threshold proxy signature scheme with known signers and Yang, Tzeng and Hwang’s efficient nonrepudiable threshol...
Kan Zhang