Sciweavers

722 search results - page 101 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
CCS
2003
ACM
15 years 5 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
CCS
2010
ACM
15 years 6 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
EUROCRYPT
2007
Springer
15 years 6 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
CHI
2006
ACM
16 years 7 days ago
Urbanhermes: social signaling with electronic fashion
Fashion signals are displayed to indicate access to information. Consistent, timely, and meaningful signal displays are only made possible if one is well-connected. While fashion ...
Christine M. Liu, Judith S. Donath
ITP
2010
155views Mathematics» more  ITP 2010»
14 years 10 months ago
Translation in XBRL standardization
eXtensible Business Reporting Language (XBRL) presents new opportunities for integrating information flow within communities of diverse organisations thereby significantly enhanci...
Indrit Troshani, Andy Lymer