Sciweavers

117 search results - page 7 / 24
» Why Cryptosystems Fail
Sort
View
ICDCSW
2007
IEEE
14 years 1 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
ASSETS
2010
ACM
13 years 7 months ago
What can the 'ash cloud' tell us about older adults' technology adoption
Older adults are often encouraged to try new technology by a specific motivator or ,,trigger. Recently, a surprising ,,trigger has emerged - the ,,ash cloud which caused large sca...
Lorna Gibson, Paula Forbes, Vicki L. Hanson
APAL
1999
88views more  APAL 1999»
13 years 7 months ago
A Simple Propositional S5 Tableau System
We give a sound and complete propositional S5 tableau system of a particularly simple sort, having an easy completeness proof. It sheds light on why the satisfiability problem for...
Melvin Fitting
ICDM
2006
IEEE
76views Data Mining» more  ICDM 2006»
14 years 1 months ago
How Bayesians Debug
Manual debugging is expensive. And the high cost has motivated extensive research on automated fault localization in both software engineering and data mining communities. Fault l...
Chao Liu 0001, Zeng Lian, Jiawei Han
CCS
2003
ACM
14 years 18 days ago
Receiver anonymity via incomparable public keys
We describe a new method for protecting the anonymity of message receivers in an untrusted network. Surprisingly, existing methods fail to provide the required level of anonymity ...
Brent R. Waters, Edward W. Felten, Amit Sahai