Sciweavers

96 search results - page 7 / 20
» Revealing Additional Information in Two-Party Computations
Sort
View
TSE
2012
11 years 10 months ago
Does Software Process Improvement Reduce the Severity of Defects? A Longitudinal Field Study
— As firms increasingly rely on information systems to perform critical functions the consequences of software defects can be catastrophic. Although the software engineering lite...
Donald E. Harter, Chris F. Kemerer, Sandra Slaught...
CHI
2009
ACM
14 years 2 months ago
Haptic feedback in remote pointing
We investigate the use of haptic feedback for enhancing user performance with remote pointing devices. We present a number of concepts that use haptic feedback on such devices and...
Laurens R. Krol, Dzmitry Aliakseyeu, Sriram Subram...
IACR
2011
87views more  IACR 2011»
12 years 7 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao
FC
2003
Springer
101views Cryptology» more  FC 2003»
14 years 20 days ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
ACISP
2007
Springer
14 years 1 months ago
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users
We propose the first single sign-on system in which a user can access services using unlinkable digital pseudonyms that can all be revoked in case she abuses any one service. Our ...
Stefan Brands, Liesje Demuynck, Bart De Decker