Sciweavers

99
Voted
CSE
2009
IEEE
15 years 6 days ago
Social Authentication Protocol for Mobile Phones
Bijan Soleymani, Muthucumaru Maheswaran
CSE
2009
IEEE
15 years 6 days ago
Edge Anonymity in Social Network Graphs
Edges in social network graphs can model sensitive relationships. In this paper, we consider the problem of edges anonymity in graphs. We propose a probabilistic notion of edge ano...
Lijie Zhang, Weining Zhang
117
Voted
CSE
2009
IEEE
15 years 6 days ago
The Influence of Personalities Upon the Dynamics of Trust and Reputation
When an agent resides in a community, the opinion of other community members concerning whether a particular individual is trustworthy or not influences the trust level of this ag...
Mark Hoogendoorn, S. Waqar Jaffry
CSE
2009
IEEE
15 years 6 days ago
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures
Abstract--A widespread design approach in distributed applications based on the service-oriented paradigm, such as web-services, consists of clearly separating the enforcement of a...
Michele Barletta, Silvio Ranise, Luca Viganò...
95
Voted
CSE
2009
IEEE
15 years 6 days ago
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach
Yasuyuki Tsukada, Ken Mano, Hideki Sakurada, Yoshi...
105
Voted
COMPLEX
2009
Springer
15 years 6 days ago
Temperature-Induced Domain Shrinking in Ising Ferromagnets Frustrated by a Long-Range Interaction
Abstract. We investigate a spin model in which a ferromagnetic shortrange interaction competes with a long-range antiferromagnetic interaction decaying spatially as 1 rd+ , d being...
Alessandro Vindigni, Oliver Portmann, Niculin Sara...
137
Voted
ACMSE
2009
ACM
15 years 7 days ago
Semantic web in eHealth
It is getting harder to extract useful information from the enormous amount of data that is being collected in the medical information systems or eHealth systems due to the distri...
Erdogan Dogdu
ACMSE
2009
ACM
15 years 7 days ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
110
Voted
WG
2010
Springer
15 years 7 days ago
From Path Graphs to Directed Path Graphs
We present a linear time algorithm to greedily orient the edges of a path graph model to obtain a directed path graph model (when possible). Moreover we extend this algorithm to fi...
Steven Chaplick, Marisa Gutierrez, Benjamin L&eacu...
112
Voted
WG
2010
Springer
15 years 7 days ago
Efficient Algorithms for Eulerian Extension
Eulerian extension problems aim at making a given (directed) (multi-)graph Eulerian by adding a minimum-cost set of edges (arcs). These problems have natural applications in schedu...
Frederic Dorn, Hannes Moser, Rolf Niedermeier, Mat...