Sciweavers

5484 search results - page 1028 / 1097
» Almost-Everywhere Secure Computation
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 15 days ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
CHI
2009
ACM
16 years 14 days ago
Natural throw and tilt interaction between mobile phones and distant displays
Raimund Dachselt University of Magdeburg Faculty of Computer Science User Interface & Software Engineering Group 39106 Magdeburg, Germany dachselt@acm.org Robert Buchholz Unive...
Raimund Dachselt, Robert Buchholz
CHI
2007
ACM
16 years 8 days ago
Noticing notice: a large-scale experiment on the timing of software license agreements
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report ...
Nathaniel Good, Jens Grossklags, Deirdre K. Mullig...
CHI
2006
ACM
16 years 8 days ago
Interweaving mobile games with everyday life
We introduce a location?based game called Feeding Yoshi that provides an example of seamful design, in which key characteristics of its underlying technologies--the coverage and s...
Marek Bell, Matthew Chalmers, Louise Barkhuus, Mal...
SIGMOD
2002
ACM
142views Database» more  SIGMOD 2002»
16 years 1 days ago
The Grid: An Application of the Semantic Web
The Grid is an emerging platform to support on-demand "virtual organisations" for coordinated resource sharing and problem solving on a global scale. The application thr...
Carole A. Goble, David De Roure
« Prev « First page 1028 / 1097 Last » Next »