Sciweavers

1663 search results - page 46 / 333
» Computer Security in the Real World
Sort
View
CRYPTO
2006
Springer
149views Cryptology» more  CRYPTO 2006»
14 years 14 days ago
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
In the setting of multiparty computation, a set of parties wish to jointly compute a function of their inputs, while preserving security in the case that some subset of them are co...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...
APIN
2008
159views more  APIN 2008»
13 years 9 months ago
Soft computing techniques applied to finance
Soft computing is progressively gaining presence in the financial world. The number of real and potential applications is very large and, accordingly, so is the presence of applied...
Asunción Mochón, David Quintana, Yag...
WETICE
2003
IEEE
14 years 2 months ago
Attack-Resistance of Computational Trust Models
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a fr...
Andrew Twigg, Nathan Dimmock
IEEEARES
2006
IEEE
14 years 2 months ago
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...
Kenji Saito, Eiichi Morino, Jun Murai
ACMACE
2006
ACM
14 years 2 months ago
Open experiments of mobile sightseeing support systems with shared virtual worlds
In this paper, we describe results from the experiments of a location-dependent shared virtual world system applied to sightseeing entertainment. This system can be used with GPSp...
Hiroyuki Tarumi, Kayo Yokoo, Shouji Nishimoto, Kaz...