Sciweavers

1663 search results - page 61 / 333
» Computer Security in the Real World
Sort
View
HAPTICS
2007
IEEE
14 years 3 months ago
The Effect of Virtual Haptic Training on Real Surgical Drilling Proficiency
This sketch presents the design and preliminary results of a study that investigates the transference of motor skills learned in a haptic-enabled virtual environment to performanc...
Christopher Sewell, Nikolas H. Blevins, Sumanth Pe...
EUROPKI
2009
Springer
13 years 6 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
AAAI
2012
11 years 11 months ago
Real-Time Collaborative Planning with the Crowd
Planning is vital to a wide range of domains, including robotics, military strategy, logistics, itinerary generation and more, that both humans and computers find difficult. Col...
Walter S. Lasecki, Jeffrey P. Bigham, James F. All...
SEUS
2008
IEEE
14 years 3 months ago
A Two-Layered Management Architecture for Building Adaptive Real-Time Systems
The concepts of Autonomic and Organic Computing (AC/OC) promise to make modern computer systems more secure and easier to manage. In this paper, we extend the observer/controller a...
Florian Kluge, Sascha Uhrig, Jörg Mische, The...
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
14 years 2 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...