Sciweavers

556 search results - page 73 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
107
Voted
ASIACRYPT
2007
Springer
15 years 8 months ago
Bounded CCA2-Secure Encryption
Abstract. Whereas encryption schemes withstanding passive chosenplaintext attacks (CPA) can be constructed based on a variety of computational assumptions, only a few assumptions a...
Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, ...
130
Voted
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
15 years 8 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
WSC
1997
15 years 3 months ago
MODSIM III - A Tutorial
This tutorial introduces the MODSIM III language, showing how its simulation "world view" together with its object-oriented architecture and built in graphics contribute...
John Goble
116
Voted
CHI
2007
ACM
16 years 2 months ago
Trust 2.1: advancing the trust debate
Trust has a considerable research tradition in the CHI community. It has been investigated in the context of e-commerce, virtual teams, online gaming, social networking ? to name ...
Jens Riegelsberger, Asimina Vasalou
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 4 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...