Sciweavers

24529 search results - page 234 / 4906
» Computing on Authenticated Data
Sort
View
117
Voted
ETS
2000
IEEE
126views Hardware» more  ETS 2000»
15 years 3 months ago
Dynamic Goal-Based Role-Play Simulation on the Web: A Case Study
This paper outlines and discusses the pedagogical approach, the technical design architecture, and an innovative implementation of a collaborative role-play simulation technology ...
Som Naidu, Albert Ip, Roni Linser
135
Voted
CORR
2010
Springer
169views Education» more  CORR 2010»
15 years 7 days ago
Multimodal Biometric Systems - Study to Improve Accuracy and Performance
Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against ...
K. Sasidhar, Vijaya L. Kakulapati, Kolikipogu Rama...
TLDI
2010
ACM
190views Formal Methods» more  TLDI 2010»
16 years 12 days ago
Distributed programming with distributed authorization
We propose a programming language, called PCML5, for building distributed applications with distributed access control. Target applications include web-based systems in which prog...
Kumar Avijit, Anupam Datta, Robert Harper
124
Voted
SOUPS
2005
ACM
15 years 9 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
138
Voted
CCS
2010
ACM
15 years 3 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann