Sciweavers

1189 search results - page 62 / 238
» Information Concealing Games
Sort
View
EIT
2009
IEEE
15 years 1 months ago
Secure end-to-end communication over GSM and PSTN networks
GSM (Global System for Mobiles) is the most widely spread mobile communication system in the world. An important objective in mobile communication systems is secure speech communic...
Saad Islam, Fatima Ajmal, Salman Ali, Jawad Zahid,...
JCS
2008
93views more  JCS 2008»
14 years 9 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
RP
2009
Springer
121views Control Systems» more  RP 2009»
15 years 4 months ago
Games with Opacity Condition
We describe the class of games with opacity condition, as an adequate model for security aspects of computing systems. We study their theoretical properties, relate them to reachab...
Bastien Maubert, Sophie Pinchinat
CHI
1994
ACM
15 years 1 months ago
What HCI designers can learn from video game designers
Computer users have tasks they need to perform, and are therefore motivated to overcome poorly designed interfaces. With video games, there is no external motivation for the task ...
Randy Pausch, Rich Gold, Tim Skelly, David Thiel
COMSIS
2004
80views more  COMSIS 2004»
14 years 9 months ago
The End of Software Engineering and the Start of Economic-Cooperative Gaming
"Software engineering" was introduced as a model for the field of software development in 1968. This paper reconsiders that model in the light of four decades of experie...
Alistair Cockburn