Sciweavers

9231 search results - page 1597 / 1847
» informs 2008
Sort
View
CRYPTO
2008
Springer
150views Cryptology» more  CRYPTO 2008»
15 years 6 months ago
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
Alexandra Boldyreva, Serge Fehr, Adam O'Neill
CRYPTO
2008
Springer
132views Cryptology» more  CRYPTO 2008»
15 years 6 months ago
Public-Key Locally-Decodable Codes
In this paper we introduce the notion of a Public-Key Encryption Scheme that is also a Locally-Decodable Error-Correcting Code (PKLDC). In particular, we allow any polynomialtime ...
Brett Hemenway, Rafail Ostrovsky
CSCW
2008
ACM
15 years 6 months ago
Changes in use and perception of facebook
As social computing systems persist over time, the user experiences and interactions they support may change. One type of social computing system, Social Network Sites (SNSs), are...
Cliff Lampe, Nicole Ellison, Charles Steinfield
CSCW
2008
ACM
15 years 6 months ago
The effects of local lag on tightly-coupled interaction in distributed groupware
Tightly-coupled interaction is shared work in which each person's actions immediately and continuously influence the actions of others. Tightly-coupled collaboration is a hal...
Dane Stuckel, Carl Gutwin
CSCW
2008
ACM
15 years 6 months ago
"Are you watching this film or what?": interruption and the juggling of cohorts
A proliferation of mobile devices in everyday life has increased the likelihood of technologically mediated interruptions. We examine ethnographic data from an SMSbased pervasive ...
Peter Tolmie, Andy Crabtree, Tom Rodden, Steve Ben...
« Prev « First page 1597 / 1847 Last » Next »