This study describes an experiment in which 126 participants engaged via a mobile telephone simulation that included a visual display in a discussion that required self-disclosure...
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
An integrated model-based development approach has to capture the relationship between requirements, design, and implementation models. In the requirements engineering phase, the m...
Security is not an isolated good, but just one component of a complicated economy. That imposes limitations on how effective it can be. The interactions of human society and human...
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can Z .execute and accumulate state , free of observation and inte...