Sciweavers

2954 search results - page 38 / 591
» Beyond
Sort
View
ADC
2007
Springer
150views Database» more  ADC 2007»
15 years 10 months ago
Beyond Purpose-Based Privacy Access Control
Research efforts have been directed toward the improvement of privacy protecting technology by incorporating privacy protection into database systems. Purpose acts as a central co...
Sabah S. Al-Fedaghi
AIED
2007
Springer
15 years 10 months ago
Beyond the code-and-count analysis of tutoring dialogues
In this paper, we raise a methodological issue concerning the empirical analysis of tutoring dialogues: The frequencies of tutoring moves do not necessarily reveal their causal efï...
Stellan Ohlsson, Barbara Di Eugenio, Bettina Chow,...
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
CRYPTO
2007
Springer
134views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
A public random function is a random function that is accessible by all parties, including the adversary. For example, a (public) random oracle is a public random function {0, 1}â...
Ueli M. Maurer, Stefano Tessaro