Sciweavers

2954 search results - page 38 / 591
» Beyond
Sort
View
ADC
2007
Springer
150views Database» more  ADC 2007»
14 years 3 months ago
Beyond Purpose-Based Privacy Access Control
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
Sabah S. Al-Fedaghi
AIED
2007
Springer
14 years 3 months ago
Beyond the code-and-count analysis of tutoring dialogues
In this paper, we raise a methodological issue concerning the empirical analysis of tutoring dialogues: The frequencies of tutoring moves do not necessarily reveal their causal efï...
Stellan Ohlsson, Barbara Di Eugenio, Bettina Chow,...
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
CRYPTO
2007
Springer
134views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
A public random function is a random function that is accessible by all parties, including the adversary. For example, a (public) random oracle is a public random function {0, 1}â...
Ueli M. Maurer, Stefano Tessaro