Sciweavers

4386 search results - page 711 / 878
» A Tamper-Resistant Programming Language System
Sort
View
IFIP
2005
Springer
15 years 8 months ago
Voting Technologies and Trust
In this paper, as a step towards the ultimate aim of developing an evoting system that would be likely to gain and retain the trust of the general voting public, we describe a des...
Brian Randell, Peter Y. A. Ryan
UM
2005
Springer
15 years 8 months ago
Using Learning Curves to Mine Student Models
This paper presents an evaluation study that measures the effect of modifying feedback generality in an Intelligent Tutoring System (ITS) based on Student Models. A taxonomy of the...
Brent Martin, Antonija Mitrovic
IFIP
2004
Springer
15 years 8 months ago
Looking Inside AES and BES
We analyze an algebraic representation of AES–128 as an embedding in BES, due to Murphy and Robshaw. We present two systems of equations S and K concerning encryption and key gen...
Ilia Toli, Alberto Zanoni
ICALP
2003
Springer
15 years 8 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
IFIP
2003
Springer
15 years 8 months ago
On the Integration of MPEG-4 Streams Pulled Out of High Performance Mobile Devices and Data Traffic over a Wireless Network
In this work we propose and evaluate mechanisms for the multiplexing and the integrated delivery of Video and Data Traffic over a Wireless Cellular High Speed Packet Switched Netwo...
Spyros Psychis, Polychronis Koutsakis, Michael Pat...