Sciweavers

455 search results - page 42 / 91
» Differential Privacy in New Settings
Sort
View
68
Voted
AGENTS
2000
Springer
15 years 2 months ago
BoB: an interactive improvisational music companion
This paper introduces a new domain for believable agents (BA) and presents novel methods for dealing with the unique challenges that arise therein. The domain is providing improvi...
Belinda Thom
ESORICS
2010
Springer
14 years 10 months ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers
ESORICS
2010
Springer
14 years 10 months ago
Kamouflage: Loss-Resistant Password Management
We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager i...
Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan ...
77
Voted
CCS
2010
ACM
14 years 10 months ago
Algebraic pseudorandom functions with improved efficiency from the augmented cascade
We construct an algebraic pseudorandom function (PRF) that is more efficient than the classic NaorReingold algebraic PRF. Our PRF is the result of adapting the cascade constructio...
Dan Boneh, Hart William Montgomery, Ananth Raghuna...
ECCV
2004
Springer
15 years 11 months ago
Structure of Applicable Surfaces from Single Views
Abstract. The deformation of applicable surfaces such as sheets of paper satisfies the differential geometric constraints of isometry (lengths and areas are conserved) and vanishin...
Nail A. Gumerov, Ali Zandifar, Ramani Duraiswami, ...