Sciweavers

470 search results - page 43 / 94
» An adaptive probabilistic trust model and its evaluation
Sort
View
POPL
2008
ACM
14 years 9 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
FLAIRS
2001
13 years 10 months ago
Exploring the Use of Cognitive Models in AI Applications Using the Stroop Effect
Using a generalized adaptive frameworkfor unified cognitive modeling,wereplicate humanperformanceon a standardStrooptask withinan explanatorycomputational modelof vision, language...
Charles Hannon, Diane J. Cook
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
14 years 2 months ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
SPIRE
2010
Springer
13 years 7 months ago
Hypergeometric Language Model and Zipf-Like Scoring Function for Web Document Similarity Retrieval
The retrieval of similar documents in the Web from a given document is different in many aspects from information retrieval based on queries generated by regular search engine use...
Felipe Bravo-Marquez, Gaston L'Huillier, Sebasti&a...
ACNS
2010
Springer
185views Cryptology» more  ACNS 2010»
14 years 1 months ago
Adaptive Chosen-Message Side-Channel Attacks
Most side-channel attacks that have been published in the open literature assume known- or chosen-message adversarial scenarios. In this paper, we analyze the increase of the attac...
Nicolas Veyrat-Charvillon, François-Xavier ...