Sciweavers

211 search results - page 6 / 43
» Secrecy and Group Creation
Sort
View
CADE
2008
Springer
14 years 9 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
LREC
2010
135views Education» more  LREC 2010»
13 years 10 months ago
Multilingual Voice Creation Toolkit for the MARY TTS Platform
This paper describes an open source voice creation toolkit that supports the creation of unit selection and HMM-based voices, for the MARY (Modular Architecture for Research on sp...
Sathish Pammi, Marcela Charfuelan, Marc Schrö...
SIGCSE
2006
ACM
183views Education» more  SIGCSE 2006»
14 years 2 months ago
Programming fundamentals and innovation taught through windows media player skin creation
Windows Media Player user interface “skin” creation has proven an extremely effective method to reinforce practical object oriented programming techniques. Skin creation motiv...
Todd Shurn
CHI
2008
ACM
14 years 9 months ago
A user study of policy creation in a flexible access-control system
Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little has been done to evaluate these systems in practic...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
WINE
2010
Springer
162views Economy» more  WINE 2010»
13 years 6 months ago
Near-Strong Equilibria in Network Creation Games
We introduce a new solution concept for games, near-strong equilibrium, a variation of strong equilibrium. Previous work has shown the existence of 2-strong pure strategy equilibr...
Ola Rozenfeld, Moshe Tennenholtz