Sciweavers

248 search results - page 40 / 50
» A study of preferences for sharing and privacy
Sort
View
ATAL
2004
Springer
15 years 3 months ago
The Advantages of Compromising in Coalition Formation with Incomplete Information
This paper presents protocols and strategies for coalition formation with incomplete information under time constraints. It focuses on strategies for coalition members to distribu...
Sarit Kraus, Onn Shehory, Gilad Taase
ICONFERENCE
2011
14 years 4 months ago
Beyond promotion and protection: creators, audiences and common ground in user-generated media
In this paper, we present findings from a qualitative study of producers in a specific creative domain—online digital photography. We used social psychology and linguistic conce...
Eric C. Cook, Stephanie D. Teasley
CHI
2007
ACM
15 years 10 months ago
Exploring patterns of social commonality among file directories at work
We studied files stored by members of a work organization for patterns of social commonality. Discovering identical or similar documents, applications, developer libraries, or oth...
John C. Tang, Clemens Drews, Mark Smith, Fei Wu, A...
IACR
2011
137views more  IACR 2011»
13 years 9 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
CCS
2008
ACM
14 years 11 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...