Sciweavers

12478 search results - page 60 / 2496
» Secure Interaction Design
Sort
View
CRYPTO
2011
Springer
207views Cryptology» more  CRYPTO 2011»
14 years 2 months ago
Secure Computation on the Web: Computing without Simultaneous Interaction
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. Amongst other things, even i...
Shai Halevi, Yehuda Lindell, Benny Pinkas
FC
2008
Springer
134views Cryptology» more  FC 2008»
15 years 4 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
110
Voted
CHI
2007
ACM
16 years 2 months ago
Designing tangibles for children: what designers need to know
New forms of tangible and spatial child computer interaction and supporting technologies can be designed to leverage the way children develop intelligence in the world. In order t...
Alissa Nicole Antle
CSFW
2006
IEEE
15 years 8 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
112
Voted
JCS
2002
132views more  JCS 2002»
15 years 2 months ago
Checking Secure Interactions of Smart Card Applets: Extended Version
Abstract. This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de...
Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-...