Sciweavers

1058 search results - page 142 / 212
» Secure Group Communications Using Key Graphs
Sort
View
MDM
2009
Springer
115views Communications» more  MDM 2009»
15 years 9 months ago
Supporting Contexts for Indoor Navigation Using a Multilayered Space Model
Indoor navigation highly depends on context and requires flexible data structures to support the many use cases and configurations. For example, an indoor navigation system must c...
Thomas Becker, Claus Nagel, Thomas H. Kolbe
ACSAC
2001
IEEE
15 years 6 months ago
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59
The security of electronic payment protocols is of interest to researchers in academia and industry. While the ultimate objective is the safest and most secure protocol, convenien...
Albert Levi, Çetin Kaya Koç
FOCS
2010
IEEE
15 years 11 days ago
On the Insecurity of Parallel Repetition for Leakage Resilience
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-r...
Allison B. Lewko, Brent Waters
133
Voted
CCS
2009
ACM
16 years 3 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
TMRA
2005
Springer
15 years 7 months ago
Collaborative Software Development and Topic Maps
This work-in-progress report subsumes our ongoing research to develop a Topic Maps centric, modularised system which supports collaborative software development by combining the me...
Markus Ueberall, Oswald Drobnik