Sciweavers

1061 search results - page 198 / 213
» A general definition of malware
Sort
View
ISMIR
2000
Springer
190views Music» more  ISMIR 2000»
13 years 11 months ago
Music IR: Past, Present, and Future
Music Information Retrieval has a longer history than most people realise, with systems developed in the 1960's. The field has its roots in information retrieval, musicology ...
Alexandra L. Uitdenbogerd
ATAL
2008
Springer
13 years 9 months ago
A distributed normative infrastructure for situated multi-agent organisations
In most of the existing approaches to the design of multiagent systems, there is no clear way in which to relate organisational and normative structures to the model of the enviro...
Fabio Y. Okuyama, Rafael H. Bordini, Antônio...
CCS
2008
ACM
13 years 9 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
CCS
2008
ACM
13 years 9 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
CCS
2008
ACM
13 years 9 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...