Sciweavers

5869 search results - page 1005 / 1174
» Multilingual Information Access
Sort
View
ACSAC
2010
IEEE
13 years 7 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
13 years 7 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel
EDBT
2010
ACM
135views Database» more  EDBT 2010»
13 years 7 months ago
Querying spatial patterns
Spatial data are common in many scientific and commercial domains such as geographical information systems and gene/protein expression profiles. Querying for distribution patterns...
Vishwakarma Singh, Arnab Bhattacharya, Ambuj K. Si...
EVOW
2010
Springer
13 years 7 months ago
Evolution of Grim Trigger in Prisoner Dilemma Game with Partial Imitation
The emergence of Grim Trigger as the dominant strategy in the Iterated Prisoner Dilemma (IPD) on a square lattice is investigated for players with finite memory, using three differ...
Degang Wu, Mathis Antony, Kwok Yip Szeto
FOCS
2010
IEEE
13 years 7 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
« Prev « First page 1005 / 1174 Last » Next »