Sciweavers

4731 search results - page 144 / 947
» Securing Interactive Programs
Sort
View
IFIP
2009
Springer
13 years 6 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
CHI
2008
ACM
14 years 9 months ago
Vocal interaction
This note discusses the design of an experimental API (application program interface) for vocal user interfaces. The emphasis is on component design which supports vocal interactio...
Sri Hastuti Kurniawan, Adam J. Sporka
IACR
2011
196views more  IACR 2011»
12 years 8 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
FPL
2001
Springer
92views Hardware» more  FPL 2001»
14 years 1 months ago
Secure Configuration of Field Programmable Gate Arrays
Although SRAM programmed Field Programmable Gate Arrays (FPGA's) have come to dominate the industry due to their density and performance advantages over non-volatile technolog...
Tom Kean
CHI
2009
ACM
14 years 9 months ago
Comparing the use of tangible and graphical programming languages for informal science education
Much of the work done in the field of tangible interaction has focused on creating tools for learning; however, in many cases, little evidence has been provided that tangible inte...
Michael S. Horn, Erin Treacy Solovey, R. Jordan Cr...