6 Hits in 3.7 sec

Oblivious Printing of Secret Messages in a Multi-party Setting [chapter]

Aleksander Essex, Urs Hengartner
2012 Lecture Notes in Computer Science  
We present multi-party protocols for obliviously printing a secret in three settings: obliviously printing the contents of a ciphertext, obliviously printing a randomized message, and generating and obliviously  ...  Finally we propose some potential applications of oblivious printing in the context of electronic voting and digital cash.  ...  We thank Jeremy Clark, Ian Goldberg, and Doug Stinson for helpful feedback.  ... 
doi:10.1007/978-3-642-32946-3_26 fatcat:j35ljb6lszeghfb3fyoa3qhmem

A Framework for Assessing Strategies and Technologies for Dynamic Packaging Applications in E-Tourism

Jorge Cardoso, Carola Lange
2007 Information Technology & Tourism  
We then discuss Web services and semantics as a possible solution for overcoming the interoperability problems that (current) dynamic packaging applications face.  ...  Dynamic packaging has been introduced as an innovative technology allowing for the automated online configuration and assembling of packaged travel products for individual customers.  ...  He has published over 40 refereed papers in the areas of process management systems, semantic Web, and application integration.  ... 
doi:10.3727/109830507779637585 fatcat:4vjewkiujzcelefbhg5cmpgsj4

Application hosting for pervasive computing

S. G. Hild, C. Binding, D. Bourges-Waldegg, C. Steenkeste
2001 IBM Systems Journal  
Finally, on the session level, much browser interac- tion is now accomplished with HTTP’’ (HyperText Transfer Protocol) 1.1-compatible service primitives, IBM SYSTEMS JOURNAL, VOL 40, NO 1, 2001 Figure  ...  On the application level, the browser and the client application execution environment differ both in syn- tax and semantics: from a syntax point of view, the Internet is currently centered around HTML  ... 
doi:10.1147/sj.401.0193 fatcat:yyy354hq2zbrfpixbhmlfps6am

On Public Values and Information Technology in Government: A Critical Discourse Analysis of Trade Regulations in Mexico

Carla Bonina
2012 Zenodo  
The use of the internet and related information and communication technologies (ICT) in public administration (known as 'e-government') has gained notable space within processes of public sector reform  ...  to traditional public administration and the bureaucratic ethos—that is, legality and honesty.  ...  Concept definitions Conceptual Protocol 1.1 Define your key terms, including discourse, text, and context Addressed explicitly in Chapter Three Epistemology Protocol 1.2 Explain which CDA tradition  ... 
doi:10.5281/zenodo.1322748 fatcat:nnxl3dte25f37n6auz72p5r6i4

Specification, Execution and Verification of Interaction Protocols An Approach based on Computational Logic Settore Disciplinare: ING-INF05 Ciclo XIX Examing Committee

Chiar Ma, Paola Mello, School, Federico Chesani, Chiar Mo, Bassi, Paola Mello, School, Paolo Bassi, Anna Ciampolini, Letizia, Cesare Stefanelli
SCIFF is based on Abductive Logic Programming, and provides a formal specification language with a clear declarative semantics (based on abduction).  ...  Computational Logic provides models, languages and tools that can be effectively adopted to address such issues: its declarative nature can be exploited for a protocol specification language, while its  ...  The SOCS-SI exploits the proof procedure to test the compliance verification of peers interactions against the protocols. 1.1 Specification Issues . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 

Turkish Local e-Governments: a Longitudinal Study

Aykut Arslan
2007 The Electronic Journal of e-Government   unpublished
The purpose of the second study was to explore the degree of change and how this change occurs in a certain time line among those authorities.  ...  This article is based on a longitudinal exploratory study of the Turkish local e-governments between September 2005 and December 2006. 3,228 Turkish local governments constitute the sampling framework  ...  Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF).  ...