Sciweavers

5604 search results - page 995 / 1121
» Becoming Increasingly Reliable
Sort
View
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
DEXA
2009
Springer
166views Database» more  DEXA 2009»
15 years 11 months ago
Tags4Tags: Using Tagging to Consolidate Tags
Tagging has become increasingly popular and useful across various social networks and applications. It allows users to classify and organize resources for improving the retrieval p...
Leyla Jael García-Castro, Martin Hepp, Alex...
ICSOC
2009
Springer
15 years 11 months ago
Evaluating Contract Compatibility for Service Composition in the SeCO2 Framework
Recently, the Software-as-a-Service (SaaS) model has been increasingly supported, becoming a major part of the new emerging cloud computing paradigms. Although SaaS exists in diff...
Marco Comerio, Hong Linh Truong, Flavio De Paoli, ...
148
Voted
MOBISEC
2009
Springer
15 years 11 months ago
Filtering SPAM in P2PSIP Communities with Web of Trust
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasing...
Juho Heikkilä, Andrei Gurtov
PRIMA
2009
Springer
15 years 11 months ago
Designing Protocols for Collaborative Translation
Abstract. In this paper, we present a protocol for collaborative translation, where two non-bilingual people who use different languages collaborate to perform the task of transla...
Daisuke Morita, Toru Ishida