Sciweavers

562 search results - page 28 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
CHI
2010
ACM
15 years 5 months ago
Critical gameplay: software studies in computer gameplay
The computer game software with which we interact on a daily basis not only entertains us, it trains us into specific patterns. Critical Gameplay is a design practice which endeav...
Lindsay Grace
ACMDIS
2000
ACM
15 years 8 months ago
Lingua Francas for Design: Sacred Places and Pattern Languages
A central challenge in interaction design has to do with its diversity. Designers, engineers, managers, marketers, researchers and users all have important contributions to make t...
Thomas Erickson
SAC
2010
ACM
15 years 9 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
INDOCRYPT
2003
Springer
15 years 9 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
IACR
2011
105views more  IACR 2011»
14 years 3 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi