Sciweavers

592 search results - page 26 / 119
» Learning of personalized security settings
Sort
View
SASN
2005
ACM
14 years 1 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
MC
2008
146views Computer Science» more  MC 2008»
13 years 9 months ago
Paper-Centric Interaction Concepts for Collaborative Learning
Field studies show that in many learning settings paper has intrinsic advantages over electronic documents. In this paper we present concepts for the collaborative annotation and ...
Jürgen Steimle, Oliver Brdiczka
ECIR
2011
Springer
12 years 11 months ago
Learning Models for Ranking Aggregates
Aggregate ranking tasks are those where documents are not the final ranking outcome, but instead an intermediary component. For instance, in expert search, a ranking of candidate ...
Craig Macdonald, Iadh Ounis
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
14 years 2 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
EUROCRYPT
2001
Springer
14 years 7 days ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith