Sciweavers

562 search results - page 18 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
INFOCOM
2011
IEEE
14 years 7 months ago
Secure friend discovery in mobile social networks
– Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who ha...
Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang
EUROPLOP
2006
15 years 5 months ago
Towards Usability-Improving Design Patterns for Mobile Client-Server Computing
: The usability of a computer system can be improved by design of the user interface, and, as importantly, by design of usersystem interactions. Our research presents usability-imp...
Bettina Biel, Volker Gruhn
KDD
2005
ACM
137views Data Mining» more  KDD 2005»
16 years 4 months ago
A generalized framework for mining spatio-temporal patterns in scientific data
In this paper, we present a general framework to discover spatial associations and spatio-temporal episodes for scientific datasets. In contrast to previous work in this area, fea...
Hui Yang, Srinivasan Parthasarathy, Sameep Mehta
196
Voted
ESAS
2007
Springer
15 years 7 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
CRYPTO
2010
Springer
181views Cryptology» more  CRYPTO 2010»
15 years 4 months ago
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Due to its universality oblivious transfer (OT) is a primitive of great importance in secure multi-party computation. OT is impossible to implement from scratch in an unconditional...
Severin Winkler, Jürg Wullschleger