Sciweavers

6300 search results - page 215 / 1260
» We have it easy, but do we have it right
Sort
View
ICISC
2003
89views Cryptology» more  ICISC 2003»
15 years 3 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
JAIR
2007
103views more  JAIR 2007»
15 years 1 months ago
Obtaining Reliable Feedback for Sanctioning Reputation Mechanisms
Reputation mechanisms offer an effective alternative to verification authorities for building trust in electronic markets with moral hazard. Future clients guide their business...
Radu Jurca, Boi Faltings
CCGRID
2010
IEEE
14 years 5 months ago
WORKEM: Representing and Emulating Distributed Scientific Workflow Execution State
- Scientific workflows have become an integral part of cyberinfrastructure as their computational complexity and data sizes have grown. However, the complexity of the distributed i...
Lavanya Ramakrishnan, Dennis Gannon, Beth Plale
P2P
2009
IEEE
15 years 8 months ago
A Trusted Infrastructure for P2P-based Marketplaces
Peer-to-peer (P2P) based marketplaces have a number of advantages over traditional centralized systems (such as eBay). Peers form a distributed hash table and store sale offers fo...
Tien Tuan Anh Dinh, Tom Chothia, Mark Ryan
104
Voted
ICSM
2009
IEEE
15 years 8 months ago
Studying the use of developer IRC meetings in open source projects
Open source developers communicate with each other via various online outlets. Thus far, mailing lists have been the main coordination mechanism. However, our previous study shows...
Emad Shihab, Zhen Ming Jiang, Ahmed E. Hassan