Sciweavers

212 search results - page 28 / 43
» Universally Composable Commitments
Sort
View
CCS
2007
ACM
14 years 2 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
SIGUCCS
2004
ACM
14 years 1 months ago
Spam software evaluation, training, and support: fighting back to reclaim the email inbox
This paper explains two projects dealing with spam recently completed at Iowa State University (ISU). The first project was undertaken by a team composed of members of the campus ...
Jeff Balvanz, Don Paulsen, Joe Struss
AIS
2006
Springer
13 years 8 months ago
Developing methods to understand discourse and workspace in distributed computer-mediated interaction
This paper presents on-going research towards understanding the discourse and workspace in computer mediated interactions. More specifically we present the development of a series...
Renate Fruchter, Humberto Cavallin
ECEASST
2010
13 years 2 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...
CORR
2011
Springer
202views Education» more  CORR 2011»
12 years 11 months ago
First-order Logic: Modality and Intensionality
Contemporary use of the term ’intension’ derives from the traditional logical Frege-Russell’s doctrine that an idea (logic formula) has both an extension and an intension. Al...
Zoran Majkic