Sciweavers

519 search results - page 66 / 104
» How to make secure email easier to use
Sort
View
PLDI
2003
ACM
15 years 2 months ago
Checking and inferring local non-aliasing
In prior work [15] we studied a language construct restrict that allows programmers to specify that certain pointers are not aliased to other pointers used within a lexical scope....
Alexander Aiken, Jeffrey S. Foster, John Kodumal, ...
ESANN
2007
14 years 11 months ago
Toward a robust 2D spatio-temporal self-organization
Abstract. Several models have been proposed for spatio-temporal selforganization, among which the TOM model by Wiemer [1] is particularly promising. In this paper, we propose to ad...
Thomas Girod, Laurent Bougrain, Frédé...
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 2 days ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
69
Voted
ACSAC
2006
IEEE
15 years 3 months ago
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
In healthcare, role-based access control systems are often extended with exception mechanisms to ensure access to needed informationeven when the needs don’t followthe expected ...
Lillian Røstad, Ole Edsberg
CSAC
2006
14 years 11 months ago
Managing Network Troubles while Interacting within Collaborative Virtual Environments
Abstract. We are interested in real time collaborative interactions within Collaborative Virtual Environments (CVE). This domain relies on the low latency offered by high speed net...
Thierry Duval, Chadi El Zammar