Sciweavers

619 search results - page 59 / 124
» Learning with Security
Sort
View
ASIACRYPT
2011
Springer
12 years 9 months ago
Functional Encryption for Inner Product Predicates from Learning with Errors
We propose a lattice-based functional encryption scheme for inner product predicates whose security follows from the difficulty of the learning with errors (LWE) problem. This co...
Shweta Agrawal, David Mandell Freeman, Vinod Vaiku...
ECIS
2000
13 years 10 months ago
Trust in Electronic Learning and Teaching Relationships: The Case of WINFO-Line
Electronic relationships in the context of electronic commerce and especially in the context of electronic learning and teaching are on the rise. However, besides the well known te...
Harald F. O. von Kortzfleisch, Udo Winand
SOUPS
2005
ACM
14 years 2 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
AGENTS
1997
Springer
14 years 1 months ago
COLLAGEN: When Agents Collaborate with People
We take the position that autonomous agents, when they interact with people, should be governed by the same principles that underlie human collaboration. These principles come fro...
Charles Rich, Candace L. Sidner
IJISEC
2006
108views more  IJISEC 2006»
13 years 9 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt