Sciweavers

8587 search results - page 1482 / 1718
» Interactive dynamic abstraction
Sort
View
124
Voted
ESORICS
2007
Springer
15 years 10 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
142
Voted
EUROSSC
2007
Springer
15 years 10 months ago
CenceMe - Injecting Sensing Presence into Social Networking Applications
Abstract. We present the design, prototype implementation, and evaluation of CenceMe, a personal sensing system that enables members of social networks to share their sensing prese...
Emiliano Miluzzo, Nicholas D. Lane, Shane B. Eisen...
FC
2007
Springer
118views Cryptology» more  FC 2007»
15 years 10 months ago
K-Anonymous Multi-party Secret Handshakes
Abstract. Anonymity-protection techniques are crucial for various commercial and financial transactions, where participants are worried about their privacy. On the other hand, aut...
Shouhuai Xu, Moti Yung
180
Voted
ICWL
2007
Springer
15 years 10 months ago
A Cloze Test Authoring System and Its Automation
Abstract. This paper presents a pilot system and discusses its possible extensions. In the first sections, we present a web-based test authoring system for English grammar and voca...
Ayako Hoshino, Hiroshi Nakagawa
IPOM
2007
Springer
15 years 10 months ago
Analysis of BGP Origin AS Changes Among Brazil-Related Autonomous Systems
Abstract. On the inter-domain Internet today, the address prefix origin in our BGP operations has become a major security concern. This critical problem can be stated simply as ...
Shih-Ming Tseng, Ke Zhang, Shyhtsun Felix Wu, Kwan...
« Prev « First page 1482 / 1718 Last » Next »