Sciweavers

2954 search results - page 38 / 591
» Beyond
Sort
View
108
Voted
ADC
2007
Springer
150views Database» more  ADC 2007»
15 years 9 months ago
Beyond Purpose-Based Privacy Access Control
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
Sabah S. Al-Fedaghi
97
Voted
AIED
2007
Springer
15 years 9 months ago
Beyond the code-and-count analysis of tutoring dialogues
In this paper, we raise a methodological issue concerning the empirical analysis of tutoring dialogues: The frequencies of tutoring moves do not necessarily reveal their causal efï...
Stellan Ohlsson, Barbara Di Eugenio, Bettina Chow,...
97
Voted
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
131
Voted
CRYPTO
2007
Springer
134views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
A public random function is a random function that is accessible by all parties, including the adversary. For example, a (public) random oracle is a public random function {0, 1}â...
Ueli M. Maurer, Stefano Tessaro