Search results for "cryptography"

showing 10 items of 657 documents

Secure Group Communication Using Fractional Public Keys

2010

Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424TheoryofComputation_MISCELLANEOUSScheme (programming language)business.industryComputer scienceKey spaceTheoryofComputation_GENERALCryptographyPublic-key cryptographySymmetric-key algorithmCommunication in small groupsCollusionbusinessKey managementcomputerComputer networkcomputer.programming_language2010 International Conference on Availability, Reliability and Security
researchProduct

A Novel Model for E-Business and E-Government Processes on Social Media

2013

Abstract The global digital economy tends to grow up through the adoption of key technologies, mobility, cloud computing, data mining, artificial intelligence or the extension of social environments. These influences turns up the economy and give rise to new tendencies for obtaining the value. The e-business and e-government strategy is not an easy to organize, although in terms of a fundamental strategy of e-business will be led by the super-expansion of the market. For this reason, the aim of this study is to demonstrate the implications that social media has in the development of electronic business (e-business) and to provide, through a mode, a viable solution to companies or even Gover…

Value (ethics)Electronic businessbusiness.industrySuiteGeneral EngineeringEnergy Engineering and Power TechnologyCloud computingModellingSoftwareKey (cryptography)EconomicsE-GovernmentSocial mediaDigital economyMarketingE-BusinessbusinessIndustrial organizationProcedia Economics and Finance
researchProduct

Co-creation of IT-value in a cluster of small enterprises

2018

Abstract There is a growing emphasis on digital transformation in research and business practice. The creation of value from IT-investments is a critical factor in digital transformation. Research has documented that the ability to realize IT-value is a very challenging endeavor, especially for small enterprises who because of resource poverty are dependent on external input and cooperation with other companies. There is a general lack of research on the phenomenon of how IT-value is co-created, particularly in small firms. This paper reports from a study of a cluster of performing arts organizations, Blender Collective. They realized that audience data is a key issue, and that they lack th…

Value (ethics)Knowledge managementPovertyComputer sciencebusiness.industry05 social sciencesDigital transformationPeer reviewResource (project management)Work (electrical)Phenomenon0502 economics and businessCo-creationKey (cryptography)General Earth and Planetary Sciences050211 marketingPerforming artsbusiness050203 business & managementGeneral Environmental ScienceProcedia Computer Science
researchProduct

Identifying the role of business accelerators in the developing business ecosystem: the life science sector

2020

PurposeBusiness accelerators have recently received increasing attention as important cogs in business ecosystem development. However, their exact role in the ecosystem is not yet well known, especially outside the IT sector. The purpose of this study is, therefore, twofold: to determine the position of life science accelerators in the business ecosystem and the attributes of support for companies and to identify key features of the life science accelerators that contribute to the change in business ecosystems.Design/methodology/approachThe authors offer an exploratory case study of five life science business accelerators and analyze the main factors affecting the companies and the whole bu…

Value (ethics)Knowledge managementbusiness.industry05 social sciencesBusiness ecosystemKey featuresRegional developmentManagement of Technology and InnovationOn demand0502 economics and businessKey (cryptography)Position (finance)050211 marketingbusiness050203 business & managementEuropean Journal of Innovation Management
researchProduct

Privacy-preserving scheme for mobile ad hoc networks

2011

This paper proposes a decentralized trust establishment protocol for mobile ad hoc networks (MANETs), where nodes establish security associations. In order to achieve privacy and security, we use homomorphic encryption and polynomial intersection so as to find the intersection of two sets. The first set represents a list of recommenders of the initiator and the second set is a list of trusted recommenders of the responder. The intersection of the sets represents a list of nodes that recommend the first node and their recommendations are trusted by the second node. In our experimental results we show that our scheme is effective even if there are 30 trusted nodes.

Vehicular ad hoc networkComputer scienceWireless ad hoc networkbusiness.industryMobile computingCryptographyMobile ad hoc networkEncryptionQA76Optimized Link State Routing ProtocolSecurity associationReputation systemComputer Science::Networking and Internet ArchitecturebusinessComputer Science::Cryptography and SecurityComputer network2011 IEEE Symposium on Computers and Communications (ISCC)
researchProduct

Attention Direction in Static and Animated Diagrams

2010

Two key requirements for comprehending a diagram are to parse it into appropriate components and to establish relevant relationships between those components. These requirements can be particularly demanding when the diagram is complex and the viewers are novices in the depicted domain. Lack of domain-specific knowledge for top-down guidance of visual attention prejudices novices' extraction of task-relevant information. Static diagrams designed for novices often include visual cues intended to improve such information extraction. However, because current approaches to cueing tend to be largely intuitive, their effectiveness can be questionable. Further, animated diagrams with their percept…

Visual processingInformation extractionParsingMultimediaComputer scienceHuman–computer interactionDiagramKey (cryptography)Information processingcomputer.software_genreSensory cuecomputerDomain (software engineering)
researchProduct

UVolc: A software platform for measuring volcanic SO2 fluxes

2012

We present here a novel stand-alone software platform, UVolc, for remotely sensed measurement of volcanic SO"2 emission rates. Such data are important diagnostics of activity conditions, with utility in forecasting measures. This code is made user friendly to enable volcanologists, who are not experts in the underlying physics of spectroscopy, to perform their own measurements. The program provides considerable reduction in errors and far greater operating flexibility than existing analogous code, which, unlike UVolc, can only interface with hardware no longer in manufacture. UVolc will be described here, including a presentation of data collected with this program in the field.

Volcanic SO2 monitoring Volcanic gas geochemistry Volcano remote sensingFlexibility (engineering)geographyUser Friendlygeography.geographical_feature_categorybusiness.industryInterface (computing)Real-time computingField (computer science)Settore GEO/08 - Geochimica E VulcanologiaSoftwareVolcanoCode (cryptography)Computers in Earth SciencesbusinessReduction (mathematics)GeologyInformation SystemsRemote sensingComputers & Geosciences
researchProduct

Communication in new technology based‐firms

2013

PurposeThe paper aims at identifying the main social media applications used by new technology based‐firms (NTBFs) and at calculating the volume of followers they have in each application. It also focuses on the amount of activity generated by the firms in those social networks, identifying the key thematic content of their social media activity, analyzing the ability to create dialogue with their stakeholders and clarifying which style of communication they use.Design/methodology/approachThe paper presents an exploratory study of the use of social media tools by NTBFs, located in Spanish Science Parks, as an important resource network for firms in the corresponding sector. A total of 432 n…

Web 2.0media_common.quotation_subjectExploratory researchManagement Science and Operations ResearchGeneral Business Management and AccountingStyle (sociolinguistics)Social media marketingPerceptionKey (cryptography)Resource networkSocial mediaBusinessMarketingmedia_commonManagement Decision
researchProduct

HTTP-level e-commerce data based on server access logs for an online store

2020

Abstract Web server logs have been extensively used as a source of data on the characteristics of Web traffic and users’ navigational patterns. In particular, Web bot detection and online purchase prediction using methods from artificial intelligence (AI) are currently key areas of research. However, in reality, it is hard to obtain logs from actual online stores and there is no common dataset that can be used across different studies. Moreover, there is a lack of studies exploring Web traffic over a longer period of time, due to the unavailability of long-term data from server logs. The need to develop reliable models of Web traffic, Web user navigation, and e-customer behaviour calls for …

Web serverDatabaseaccess logComputer Networks and CommunicationsComputer sciencebusiness.industry020206 networking & telecommunicationselectronic commerce02 engineering and technologyE-commerceWeb trafficcomputer.software_genreWeb trafficWeb serveronline store0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingHTTP trafficUnavailabilitybusinesscomputerData ArticleComputer Networks
researchProduct

Application of neural network to predict purchases in online store

2016

A key ability of competitive online stores is effective prediction of customers’ purchase intentions as it makes it possible to apply personalized service strategy to convert visitors into buyers and increase sales conversion rates. Data mining and artificial intelligence techniques have proven to be successful in classification and prediction tasks in complex real-time systems, like e-commerce sites. In this paper we proposed a back-propagation neural network model aiming at predicting purchases in active user sessions in a Web store. The neural network training and evaluation was performed using a set of user sessions reconstructed from server log data. The proposed neural network was abl…

Web usage miningService strategyRecallArtificial neural networkWeb miningbusiness.industryComputer scienceneural networklog file analysisE-commerceServer logMachine learningcomputer.software_genreartificial intelligenceSet (abstract data type)Web miningonline storeKey (cryptography)e-commerceWeb storeArtificial intelligencebusinesscomputer
researchProduct