Sciweavers

97 search results - page 12 / 20
» Is privacy compatible with truthfulness
Sort
View
ACSAC
2000
IEEE
14 years 1 days ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
CSFW
2000
IEEE
13 years 11 months ago
Possibilistic Definitions of Security - An Assembly Kit
We present a framework in which different notions of security can be defined in a uniform and modular way. Each definition of security is formalized as a security predicate by ass...
Heiko Mantel
ESORICS
2010
Springer
13 years 8 months ago
Election Verifiability in Electronic Voting Protocols
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Steve Kremer, Mark Ryan, Ben Smyth
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 3 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
ECCV
2004
Springer
14 years 9 months ago
Unlevel-Sets: Geometry and Prior-Based Segmentation
We present a novel variational approach to top-down image segmentation, which accounts for significant projective transformations between a single prior image and the image to be s...
Tammy Riklin-Raviv, Nahum Kiryati, Nir A. Sochen