Sciweavers

2192 search results - page 335 / 439
» Plumbing and Other Utilities
Sort
View
SOUPS
2005
ACM
14 years 3 months ago
Stopping spyware at the gate: a user study of privacy, notice and spyware
Spyware is a significant problem for most computer users. The term “spyware” loosely describes a new class of computer software. This type of software may track user activitie...
Nathaniel Good, Rachna Dhamija, Jens Grossklags, D...
ICICS
2005
Springer
14 years 3 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
MHCI
2005
Springer
14 years 3 months ago
Telelogs: a social communication space for urban environments
This paper presents a novel idea for a system known as Telelogs. Utilizing the ubiquity of mobile devices, Telelogs functions as a service by which individuals in an urban environ...
Brian Davis, Karrie Karahalios
ASIACRYPT
2004
Springer
14 years 3 months ago
Eliminating Random Permutation Oracles in the Even-Mansour Cipher
Abstract. Even and Mansour [EM97] proposed a block cipher construction that takes a publicly computable random permutation oracle P and XORs different keys prior to and after appl...
Craig Gentry, Zulfikar Ramzan
UPP
2004
Springer
14 years 3 months ago
Inverse Design of Cellular Automata by Genetic Algorithms: An Unconventional Programming Paradigm
Evolving solutions rather than computing them certainly represents an unconventional programming approach. The general methodology of evolutionary computation has already been know...
Thomas Bäck, Ron Breukelaar, Lars Willmes