Sciweavers

20175 search results - page 137 / 4035
» Is abstraction the key to computing
Sort
View
93
Voted
CHI
2007
ACM
16 years 1 months ago
Dealing with key challenges in international usability and user research
In this SIG, we will present scenarios that exemplify many of the key challenges of doing user research and usability evaluation internationally. We will use these to stimulate di...
David A. Siegel, Susan M. Dray, Rolf Molich
111
Voted
AINA
2005
IEEE
15 years 6 months ago
Dynamic Key Generations for Secret Sharing in Access Structures
In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the sec...
Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen
108
Voted
EUC
2008
Springer
15 years 2 months ago
Efficient Client-to-Client Password Authenticated Key Exchange
With the rapid proliferation of client-to-client applications, PAKE (password authenticated key exchange) protocols in the client-to-client setting become increasingly important. ...
Yanjiang Yang, Feng Bao, Robert H. Deng
134
Voted
ACL
2012
13 years 3 months ago
Decoding Running Key Ciphers
There has been recent interest in the problem of decoding letter substitution ciphers using techniques inspired by natural language processing. We consider a different type of cla...
Sravana Reddy, Kevin Knight
107
Voted
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 10 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano