Sciweavers

5665 search results - page 15 / 1133
» Introduction to Computer Security
Sort
View
COMPUTER
2000
52views more  COMPUTER 2000»
13 years 7 months ago
An Introduction to Evaluating Biometric Systems
P. Jonathon Phillips, Alvin F. Martin, Charles L. ...
OOPSLA
2005
Springer
14 years 1 months ago
Adding trace matching with free variables to AspectJ
An aspect observes the execution of a base program; when certain actions occur, the aspect runs some extra code of its own. In the AspectJ language, the observations that an aspec...
Chris Allan, Pavel Avgustinov, Aske Simon Christen...
CRYPTO
2012
Springer
262views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
Functional Encryption with Bounded Collusions via Multi-party Computation
We construct a functional encryption scheme secure against an a-priori bounded polynomial number of collusions for the class of all polynomial-size circuits. Our constructions req...
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
AAAI
2012
11 years 10 months ago
Computing Game-Theoretic Solutions and Applications to Security
The multiagent systems community has adopted game theory as a framework for the design of systems of multiple self-interested agents. For this to be effective, efficient algorith...
Vincent Conitzer

Publication
145views
15 years 5 months ago
A Precompetitive Consortium on Wide-Band All-Optical Networks
This paper represents the technical core of a pre-competitive consortium formed by AT&T, DEC and MIT to study the technology, architecture and applications of wide-band all-opt...
Alexander, S.B., Bondurant, R.S., Byrne, D.C., Cha...