Sciweavers

TIST
2010
86views Education» more  TIST 2010»
13 years 2 months ago
Evolution of state-dependent risk preferences
Patrick Roos, Ryan Carr, Dana S. Nau
TIST
2010
105views Education» more  TIST 2010»
13 years 2 months ago
Structured coalitions in resource selection games
Michal Feldman, Moshe Tennenholtz
TIST
2010
71views Education» more  TIST 2010»
13 years 2 months ago
Opinion formation under costly expression
Fang Wu, Bernardo A. Huberman
TISSEC
2010
104views more  TISSEC 2010»
13 years 2 months ago
MPSS: Mobile Proactive Secret Sharing
David A. Schultz, Barbara Liskov, Moses Liskov
TISSEC
2010
129views more  TISSEC 2010»
13 years 2 months ago
Authenticated Index Structures for Aggregation Queries
Feifei Li, Marios Hadjieleftheriou, George Kollios...
TISSEC
2010
88views more  TISSEC 2010»
13 years 2 months ago
Pairing-Based Onion Routing with Improved Forward Secrecy
Aniket Kate, Gregory M. Zaverucha, Ian Goldberg
TISSEC
2010
119views more  TISSEC 2010»
13 years 2 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
TISSEC
2010
237views more  TISSEC 2010»
13 years 2 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
TISSEC
2010
115views more  TISSEC 2010»
13 years 2 months ago
A Simple and Generic Construction of Authenticated Encryption with Associated Data
We revisit the problem of constructing a protocol for performing authenticated encryption with associated data (AEAD). A technique is described which combines a collision resistant...
Palash Sarkar
TISSEC
2010
79views more  TISSEC 2010»
13 years 2 months ago
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations
Charles V. Wright, Lucas Ballard, Scott E. Coull, ...