Sciweavers

5476 search results - page 178 / 1096
» Resettably Secure Computation
Sort
View
TIFS
2010
186views more  TIFS 2010»
15 years 3 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
ICDM
2010
IEEE
160views Data Mining» more  ICDM 2010»
15 years 2 months ago
A Privacy Preserving Framework for Gaussian Mixture Models
Abstract--This paper presents a framework for privacypreserving Gaussian Mixture Model computations. Specifically, we consider a scenario where a central service wants to learn the...
Madhusudana Shashanka
119
Voted
IEEEARES
2010
IEEE
15 years 11 months ago
Security and Usability: Analysis and Evaluation
Abstract—The differences between the fields of HumanComputer Interaction and Security (HCISec) and HumanComputer Interaction (HCI) have not been investigated very closely. Many ...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
159
Voted
INFOSECCD
2006
ACM
15 years 10 months ago
Is attack better than defense?: teaching information security the right way
A recent trend in security education is towards teaching offensive techniques which were originally developed by hackers. This reflects tendencies in the professional world where ...
Martin Mink, Felix C. Freiling
129
Voted
NSPW
2004
ACM
15 years 10 months ago
Towards agile security assurance
Agile development methodologies are gaining acceptance in the software industry. If they are to be used for constructing securitycritical solutions, what do we do about assurance?...
Konstantin Beznosov, Philippe Kruchten