Search results for "cryptography"
showing 10 items of 657 documents
Secure Group Communication Using Fractional Public Keys
2010
Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…
A Novel Model for E-Business and E-Government Processes on Social Media
2013
Abstract The global digital economy tends to grow up through the adoption of key technologies, mobility, cloud computing, data mining, artificial intelligence or the extension of social environments. These influences turns up the economy and give rise to new tendencies for obtaining the value. The e-business and e-government strategy is not an easy to organize, although in terms of a fundamental strategy of e-business will be led by the super-expansion of the market. For this reason, the aim of this study is to demonstrate the implications that social media has in the development of electronic business (e-business) and to provide, through a mode, a viable solution to companies or even Gover…
Co-creation of IT-value in a cluster of small enterprises
2018
Abstract There is a growing emphasis on digital transformation in research and business practice. The creation of value from IT-investments is a critical factor in digital transformation. Research has documented that the ability to realize IT-value is a very challenging endeavor, especially for small enterprises who because of resource poverty are dependent on external input and cooperation with other companies. There is a general lack of research on the phenomenon of how IT-value is co-created, particularly in small firms. This paper reports from a study of a cluster of performing arts organizations, Blender Collective. They realized that audience data is a key issue, and that they lack th…
Identifying the role of business accelerators in the developing business ecosystem: the life science sector
2020
PurposeBusiness accelerators have recently received increasing attention as important cogs in business ecosystem development. However, their exact role in the ecosystem is not yet well known, especially outside the IT sector. The purpose of this study is, therefore, twofold: to determine the position of life science accelerators in the business ecosystem and the attributes of support for companies and to identify key features of the life science accelerators that contribute to the change in business ecosystems.Design/methodology/approachThe authors offer an exploratory case study of five life science business accelerators and analyze the main factors affecting the companies and the whole bu…
Privacy-preserving scheme for mobile ad hoc networks
2011
This paper proposes a decentralized trust establishment protocol for mobile ad hoc networks (MANETs), where nodes establish security associations. In order to achieve privacy and security, we use homomorphic encryption and polynomial intersection so as to find the intersection of two sets. The first set represents a list of recommenders of the initiator and the second set is a list of trusted recommenders of the responder. The intersection of the sets represents a list of nodes that recommend the first node and their recommendations are trusted by the second node. In our experimental results we show that our scheme is effective even if there are 30 trusted nodes.
Attention Direction in Static and Animated Diagrams
2010
Two key requirements for comprehending a diagram are to parse it into appropriate components and to establish relevant relationships between those components. These requirements can be particularly demanding when the diagram is complex and the viewers are novices in the depicted domain. Lack of domain-specific knowledge for top-down guidance of visual attention prejudices novices' extraction of task-relevant information. Static diagrams designed for novices often include visual cues intended to improve such information extraction. However, because current approaches to cueing tend to be largely intuitive, their effectiveness can be questionable. Further, animated diagrams with their percept…
UVolc: A software platform for measuring volcanic SO2 fluxes
2012
We present here a novel stand-alone software platform, UVolc, for remotely sensed measurement of volcanic SO"2 emission rates. Such data are important diagnostics of activity conditions, with utility in forecasting measures. This code is made user friendly to enable volcanologists, who are not experts in the underlying physics of spectroscopy, to perform their own measurements. The program provides considerable reduction in errors and far greater operating flexibility than existing analogous code, which, unlike UVolc, can only interface with hardware no longer in manufacture. UVolc will be described here, including a presentation of data collected with this program in the field.
Communication in new technology based‐firms
2013
PurposeThe paper aims at identifying the main social media applications used by new technology based‐firms (NTBFs) and at calculating the volume of followers they have in each application. It also focuses on the amount of activity generated by the firms in those social networks, identifying the key thematic content of their social media activity, analyzing the ability to create dialogue with their stakeholders and clarifying which style of communication they use.Design/methodology/approachThe paper presents an exploratory study of the use of social media tools by NTBFs, located in Spanish Science Parks, as an important resource network for firms in the corresponding sector. A total of 432 n…
HTTP-level e-commerce data based on server access logs for an online store
2020
Abstract Web server logs have been extensively used as a source of data on the characteristics of Web traffic and users’ navigational patterns. In particular, Web bot detection and online purchase prediction using methods from artificial intelligence (AI) are currently key areas of research. However, in reality, it is hard to obtain logs from actual online stores and there is no common dataset that can be used across different studies. Moreover, there is a lack of studies exploring Web traffic over a longer period of time, due to the unavailability of long-term data from server logs. The need to develop reliable models of Web traffic, Web user navigation, and e-customer behaviour calls for …
Application of neural network to predict purchases in online store
2016
A key ability of competitive online stores is effective prediction of customers’ purchase intentions as it makes it possible to apply personalized service strategy to convert visitors into buyers and increase sales conversion rates. Data mining and artificial intelligence techniques have proven to be successful in classification and prediction tasks in complex real-time systems, like e-commerce sites. In this paper we proposed a back-propagation neural network model aiming at predicting purchases in active user sessions in a Web store. The neural network training and evaluation was performed using a set of user sessions reconstructed from server log data. The proposed neural network was abl…