Sciweavers

5476 search results - page 964 / 1096
» Resettably Secure Computation
Sort
View
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
14 years 8 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
CHI
2011
ACM
14 years 8 months ago
More than skin deep: measuring effects of the underlying model on access-control system usability
In access-control systems, policy rules conflict when they prescribe different decisions (ALLOW or DENY) for the same access. We present the results of a user study that demonstr...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
ICCSA
2011
Springer
14 years 8 months ago
Integration of ePortfolios in Learning Management Systems
The LMS plays a decisive role in most eLearning environments. Although they integrate many useful tools for managing eLearning activities, they must also be effectively integrated ...
Ricardo Queirós, Lino Oliveira, José...
NETWORKING
2011
14 years 7 months ago
Modelling and Evaluation of CCN-Caching Trees
Networking Named Content (NNC) was recently proposed as a new networking paradigm to realise Content Centric Networks (CCNs). The new paradigm changes much about the current Intern...
Ioannis Psaras, Richard G. Clegg, Raul Landa, Wei ...
CSE
2011
IEEE
14 years 4 months ago
Parallel Execution of AES-CTR Algorithm Using Extended Block Size
—Data encryption and decryption are common operations in a network based application programs with security. In order to keep pace with the input data rate in such applications, ...
Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Seung-...