Sciweavers

2714 search results - page 446 / 543
» Under the table interaction
Sort
View
TIT
2010
150views Education» more  TIT 2010»
13 years 4 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Amin Aminzadeh Gohari, Venkat Anantharam
TOSEM
2010
168views more  TOSEM 2010»
13 years 4 months ago
Analysis and applications of timed service protocols
Web services are increasingly gaining acceptance as a framework for facilitating application-to-application interactions within and across enterprises. It is commonly accepted tha...
Julien Ponge, Boualem Benatallah, Fabio Casati, Fa...
TRETS
2010
109views more  TRETS 2010»
13 years 4 months ago
Improving the Robustness of Ring Oscillator TRNGs
A ring oscillator based true-random number generator design (Rings design) was introduced in [1]. The design was rigorously analyzed under a mathematical model and its performance...
Sang-Kyung Yoo, Deniz Karakoyunlu, Berk Birand, Be...
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
13 years 1 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
CGF
2011
13 years 1 months ago
Fruit Senescence and Decay Simulation
Aging and imperfections provide important visual cues for realism. We present a novel physically-based approach for simulating the biological aging and decay process in fruits. Th...
Joseph T. Kider Jr., Samantha Raja, Norman I. Badl...