Sciweavers

562 search results - page 53 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
IUSED
2008
15 years 5 months ago
Preparing Usability Supporting Architectural Patterns for Industrial Use
Usability supporting architectural patterns (USAPs) have been shown to provide developers with useful guidance for producing a software architecture design that supports usability...
Pia Stoll, Bonnie E. John, Len Bass, Elspeth Golde...
JOC
2007
94views more  JOC 2007»
15 years 3 months ago
On Unconditionally Secure Distributed Oblivious Transfer
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one o...
Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Dou...
AOSD
2009
ACM
15 years 10 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
ATAL
2005
Springer
15 years 9 months ago
A real-world approach to secure and trusted negotiation in MASs
The problem of providing tools to support legally valid negotiations between agents is becoming more and more critical. Agents are supposed to perform crucial tasks autonomously; ...
Roberto Bianchi, Andrea Fontana, Federico Bergenti
CHI
2004
ACM
16 years 4 months ago
Interactive Comprehensible Data Mining
This paper discusses a novel data mining system devised and developed at Birmingham, which attempts to provide a more effective data mining system. It ties in with the workshop go...
Andy Pryke, Russell Beale