Sciweavers

5722 search results - page 116 / 1145
» Security Function Interactions
Sort
View
HICSS
2008
IEEE
128views Biometrics» more  HICSS 2008»
14 years 3 months ago
Communicators' Perceptions of Social Presence as a Function of Avatar Realism in Small Display Mobile Communication Devices
This study describes an experiment in which 126 participants engaged via a mobile telephone simulation that included a visual display in a discussion that required self-disclosure...
Sin-Hwa Kang, James H. Watt, Sasi Kanth Ala
IACR
2011
94views more  IACR 2011»
12 years 8 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
CBSE
2009
Springer
14 years 3 months ago
Integrating Functional and Architectural Views of Reactive Systems
An integrated model-based development approach has to capture the relationship between requirements, design, and implementation models. In the requirements engineering phase, the m...
Jewgenij Botaschanjan, Alexander Harhurin
FC
2003
Springer
125views Cryptology» more  FC 2003»
14 years 2 months ago
Economics, Psychology, and Sociology of Security
Security is not an isolated good, but just one component of a complicated economy. That imposes limitations on how effective it can be. The interactions of human society and human...
Andrew M. Odlyzko
CN
1999
88views more  CN 1999»
13 years 8 months ago
Building a high-performance, programmable secure coprocessor
Secure coprocessors enable secure distributed applications by providing safe havens where an application program can Z .execute and accumulate state , free of observation and inte...
Sean W. Smith, Steve Weingart