Sciweavers

24529 search results - page 141 / 4906
» Computing on Authenticated Data
Sort
View
128
Voted
APSCC
2007
IEEE
15 years 9 months ago
ID-Based Key Agreement for Dynamic Peer Groups in Mobile Computing Environments
In order to secure communications for dynamic peer groups in mobile computing environments, key agreement protocols are required. In this paper, we propose a new key agreement pro...
Raylin Tso, Xun Yi, Eiji Okamoto
123
Voted
PERCOM
2007
ACM
16 years 2 months ago
Distributed, Uncertainty-Aware Access Control for Pervasive Computing
Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for en...
Urs Hengartner, Ge Zhong
116
Voted
HCI
2009
15 years 12 days ago
Social Practice: Becoming Enculturated in Human-Computer Interaction
Abstract. We present a new approach to the design, development and evaluation of embodied conversational agents (ECAs) that allows them to index identity through culturally and soc...
Justine Cassell
SSDBM
2005
IEEE
132views Database» more  SSDBM 2005»
15 years 8 months ago
Co-Scheduling of Computation and Data on Computer Clusters
Scientific investigations have to deal with rapidly growing amounts of data from simulations and experiments. During data analysis, scientists typically want to extract subsets o...
Alexandru Romosan, Doron Rotem, Arie Shoshani, Der...
121
Voted
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 8 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet