Sciweavers

164 search results - page 21 / 33
» A Case (Study) For Usability in Secure Email Communication
Sort
View
PASTE
2010
ACM
14 years 26 days ago
Opportunities for concurrent dynamic analysis with explicit inter-core communication
Multicore is now the dominant processor trend, and the number of cores is rapidly increasing. The paradigm shift to multicore forces the redesign of the software stack, which incl...
Jungwoo Ha, Stephen P. Crago
TCC
2009
Springer
141views Cryptology» more  TCC 2009»
14 years 8 months ago
Proofs of Retrievability via Hardness Amplification
Proofs of Retrievability (PoR), introduced by Juels and Kaliski [JK07], allow the client to store a file F on an untrusted server, and later run an efficient audit protocol in whi...
Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs
APSEC
2005
IEEE
14 years 1 months ago
CoxR: Open Source Development History Search System
In typical open source software development, developers use revision control systems for product management, mailing list systems for human communications, and bug tracking system...
Makoto Matsushita, Kei Sasaki, Katsuro Inoue
GROUP
2005
ACM
14 years 1 months ago
VERN: facilitating democratic group decision making online
VERN is an online collaborative tool that coordinates and distributes the process of finding optimal meeting times across the members of a group. The system combines the underlyin...
Sarita Yardi, Benjamin Hill, Stephen Chan
CORR
2008
Springer
139views Education» more  CORR 2008»
13 years 7 months ago
The Secrecy Graph and Some of its Properties
A new random geometric graph model, the so-called secrecy graph, is introduced and studied. The graph represents a wireless network and includes only edges over which secure commun...
Martin Haenggi