Sciweavers

1492 search results - page 101 / 299
» Accessibility and computer science education
Sort
View
STOC
2000
ACM
137views Algorithms» more  STOC 2000»
15 years 4 months ago
On the complexity of verifiable secret sharing and multiparty computation
We first study the problem of doing Verifiable Secret Sharing (VSS) information theoretically secure for a general access structure. We do it in the model where private channels b...
Ronald Cramer, Ivan Damgård, Stefan Dziembow...
CORR
2006
Springer
97views Education» more  CORR 2006»
15 years 23 days ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt
93
Voted
WPES
2005
ACM
15 years 6 months ago
Anonymous yet accountable access control
This paper introduces a novel approach for augmenting attributebased access control systems in a way that allows them to offer fully anonymous access to resources while at the sam...
Michael Backes, Jan Camenisch, Dieter Sommer
ITICSE
2005
ACM
15 years 6 months ago
Teaching software engineering through game design
Many projects currently used in Software Engineering curricula lack both the “fun factor” needed to engage students, as well as the practical realism of engineering projects t...
Kajal T. Claypool, Mark Claypool
113
Voted
ACMSE
2009
ACM
15 years 4 months ago
Using computer graphics to explore object oriented concepts using C
Most recent graphics courses are what we would call topdown courses. Courses that focus on using graphical packages to implement and teach graphics. The course discussed in this p...
William C. Kreahling