Sciweavers

556 search results - page 66 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
DBSEC
2007
112views Database» more  DBSEC 2007»
15 years 1 months ago
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments
Abstract. The event-condition-action (ECA) paradigm holds enormous potential in pervasive computing environments. However, the problem of reliable delivery of event data, generated...
Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ra...
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
15 years 5 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi
ISI
2007
Springer
15 years 6 months ago
An LDA-based Community Structure Discovery Approach for Large-Scale Social Networks
Abstract— Community discovery has drawn significant research interests among researchers from many disciplines for its increasing application in multiple, disparate areas, inclu...
Haizheng Zhang, Baojun Qiu, C. Lee Giles, Henry C....
ESORICS
2009
Springer
16 years 13 days ago
Formal Indistinguishability Extended to the Random Oracle Model
Abstract. Several generic constructions for transforming one-way functions to asymmetric encryption schemes have been proposed. One-way functions only guarantee the weak secrecy of...
Cristian Ene, Yassine Lakhnech, Van Chan Ngo
CHI
1995
ACM
15 years 3 months ago
LyberWorld: a 3D graphical user interface for fulltext retrieval
ld is a prototype IR user interface. It implements visualizations of an abstract information space – fulltext. The presentation demonstrates a visual user interface for the prob...
Matthias Hemmje