Filters








4 Hits in 15.8 sec

A SEMANTIC APPROACH TO DRIVING BEHAVIOR ANALYSIS

VINCENZO DI LECCE, ALBERTO AMATO, MARCO CALABRESE
2009 Journal of Circuits, Systems and Computers  
Calabrese, Customizing Blended Learning Platforms:Ariann@ Project Experience, IEEE 6th International Conference on Information and Communications Technologies (ICICT2008), Cairo -Egypt, 16 -18 Dec. 2008  ...  Soldo, A Semantic Lexicon-based Approach for Sense Disambiguation and Its WWW Application. International Conference on Intelligent Computing (ICIC 2009).  ... 
doi:10.1142/s0218126609005873 fatcat:x4n4ne7dqffmlmcjybbxp6kr2y

Determinants of Continuance Intention to Use Open Data Website: An Insight from Indonesia

Widia Resti Fitriani, Achmad Nizar Hidayanto, Puspa I. Sandhyaduhita, Betty Purwandari, Meidi Kosandi
2019 Pacific Asia Journal of the Association for Information Systems  
Systems quality affects perceived ease of use, while information quality positively affects perceived usefulness, perceived ease of use, and trust.  ...  Open data is a flagship initiative in open government program to increase transparency, social and commercial value, and participatory governance.  ...  Her research papers have appeared in Procedia Computer Science, International Journal of Innovation and Learning and conferences such as PACIS, ICACSIS, CITSM, ACM International Conference Proceeding Series  ... 
doi:10.17705/1pais.11205 fatcat:og4jvpjuifcfbdq7wnfyefa2hq

Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication [chapter]

Michel Abdalla, David Pointcheval
2005 Lecture Notes in Computer Science  
In these protocols, the goal is to enable users communicating over an unreliable channel to establish a secure session key even when the secret key that they share is drawn from a small set of values.  ...  The proof of security is in the random oracle model and is based on new and apparently stronger variants of the decisional Diffie-Hellman problem which are of independent interest.  ...  The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ... 
doi:10.1007/11507840_31 fatcat:ckqqntc5cfgopocarasl5usk5e

ePub WU Institutional Repository

Daniel Lieser
unpublished
.: Information and Communications Security. 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, Springer, Berlin (2002), S. 148f.  ...  (Hrsg.): Advances in Cryptology -ASIACRYPT 2000. 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000 Proceedings, Springer  ... 
fatcat:dmg25q22zvfudbwbeyoj6jdfie