Sciweavers

1186 search results - page 202 / 238
» Goal-Oriented Interaction Protocols
Sort
View
CISC
2006
Springer
103views Cryptology» more  CISC 2006»
14 years 2 months ago
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Christophe Tartary, Huaxiong Wang
ACSAC
2001
IEEE
14 years 2 months ago
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...
Bernd Blobel
USS
2008
14 years 1 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...
USS
2008
14 years 1 months ago
Securing Frame Communication in Browsers
Many web sites embed third-party content in frames, relying on the browser's security policy to protect them from malicious content. Frames, however, are often insufficient i...
Adam Barth, Collin Jackson, John C. Mitchell
ECOOP
2008
Springer
14 years 23 days ago
Session-Based Distributed Programming in Java
This paper demonstrates the impact of integrating session types and object-oriented programming, through their implementation in Java. Seses provide high-level abstraction for stru...
Raymond Hu, Nobuko Yoshida, Kohei Honda