Sciweavers

164 search results - page 25 / 33
» Covert two-party computation
Sort
View
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 7 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
CHI
2008
ACM
14 years 10 months ago
Designing for bystanders: reflections on building a public digital forum
In this paper, we reflect on the design and deployment process of MAGICBoard, a public display deployed in a university setting that solicits the electronic votes and opinions of ...
Anthony Tang, Matthias Finke, Michael Blackstock, ...
UIST
1994
ACM
14 years 1 months ago
A Perceptually-Supported Sketch Editor
The human visual system makes a great deal more of images than the elemental marks on a surface. In the course of viewing, creating, or editing a picture, we actively construct a ...
Eric Saund, Thomas P. Moran
ICCV
2005
IEEE
14 years 11 months ago
Designing Spatially Coherent Minimizing Flows for Variational Problems Based on Active Contours
This paper tackles an important aspect of the variational problems involving active contours, which has been largely overlooked so far: the optimization by gradient flows. Classic...
Guillaume Charpiat, Renaud Keriven, Jean-Philippe ...
MOBIHOC
2003
ACM
14 years 9 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong