User interfaces and information systems have become increasingly social in recent years, aimed at supporting the decentralized, cooperative production and use of content. A theory...
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
It is widely held that programming language extensions that support separation of concerns and that are also integrative benefit development, maintenance and reuse of software de...
R. E. Kurt Stirewalt, Laura K. Dillon, Reimer Behr...
"Although an application's human interface designer and software developer might well be the same person, the two jobs involve different tasks and require different skill...
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...