Sciweavers

1323 search results - page 159 / 265
» Updatable Security Views
Sort
View
SPW
2000
Springer
15 years 6 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
EUROCRYPT
2010
Springer
15 years 5 months ago
Constructing Verifiable Random Functions with Large Input Spaces
We present a family of verifiable random functions which are provably secure for exponentially-large input spaces under a non-interactive complexity assumption. Prior construction...
Susan Hohenberger, Brent Waters
PAISI
2010
Springer
15 years 4 months ago
Identifying Controversial Issues and Their Sub-topics in News Articles
We tackle the problem of automatically detecting controversial issues and their subtopics from news articles. We define a controversial issue as a concept that invokes conflicting ...
Yoonjung Choi, Yuchul Jung, Sung-Hyon Myaeng
ISI
2008
Springer
15 years 2 months ago
Towards service-oriented continuous queries in pervasive systems
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be used...
Yann Gripay, Frédérique Laforest, Je...
148
Voted
IFIPTCS
2010
15 years 13 days ago
A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis
Abstract. We propose a framework for reasoning about program security building on language-theoretic and coalgebraic concepts. The behaviour of a system is viewed as a mapping from...
Michele Boreale, David Clark, Daniele Gorla