Sciweavers

2421 search results - page 34 / 485
» Message from the Co-Chairs
Sort
View
CISIS
2010
IEEE
14 years 2 months ago
On a Journey from Message to Observable Pervasive Application
—Bringing together heterogeneous computing devices and appliances gives rise to a spontaneous environment where resources exchange messages, such as a mobile phone telling the ca...
Geert Vanderhulst, Kris Luyten, Karin Coninx
CRYPTO
2006
Springer
109views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
There are several candidate semantically secure encryption schemes, yet in many applications non-malleability of encryptions is crucial. We show how to transform any semantically s...
Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
CRYPTO
2008
Springer
107views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Circular-Secure Encryption from Decision Diffie-Hellman
We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a "key cy...
Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Os...
IUI
2006
ACM
14 years 1 months ago
A hybrid learning system for recognizing user tasks from desktop activities and email messages
The TaskTracer system seeks to help multi-tasking users manage the resources that they create and access while carrying out their work activities. It does this by associating with...
Jianqiang Shen, Lida Li, Thomas G. Dietterich, Jon...
CRYPTO
2009
Springer
91views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Message Authentication Codes from Unpredictable Block Ciphers
Yevgeniy Dodis, John P. Steinberger