Sciweavers

2022 search results - page 343 / 405
» Trust in Multi-Agent Systems
Sort
View
EUROPKI
2009
Springer
14 years 7 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
JCDL
2011
ACM
228views Education» more  JCDL 2011»
14 years 23 days ago
The ownership and reuse of visual media
This paper presents the results of a study of the ownership and reuse of visual media. A survey was administered to 250 social media-savvy respondents to investigate their attitud...
Catherine C. Marshall, Frank M. Shipman III
DGO
2004
108views Education» more  DGO 2004»
14 years 11 months ago
A Project to Assess Voting Technology and Ballot Design
The interdisciplinary project uses a variety of research designs, data collection methodologies, and analysis techniques and two ballot designs to assess five commercially availab...
Paul S. Herrnson, Richard G. Niemi, Benjamin B. Be...
AIM
2002
14 years 9 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
CHI
2008
ACM
15 years 10 months ago
Lifting the veil: improving accountability and social transparency in Wikipedia with wikidashboard
Wikis are collaborative systems in which virtually anyone can edit anything. Although wikis have become highly popular in many domains, their mutable nature often leads them to be...
Bongwon Suh, Ed H. Chi, Aniket Kittur, Bryan A. Pe...