Sciweavers

1460 search results - page 215 / 292
» Meeting people where they are
Sort
View
ASIACRYPT
2001
Springer
15 years 4 months ago
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Abstract. Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is o...
Pierre-Alain Fouque, David Pointcheval
IWSSD
2000
IEEE
15 years 4 months ago
An Approach to Preserving Sufficient Correctness in Open Resource Coalitions
Most software that most people use most of the time needs only moderate assurance of fitness for its intended purpose. Unlike high-assurance software, where the severe consequence...
Orna Raz, Mary Shaw
CHI
2000
ACM
15 years 4 months ago
Jotmail: a voicemail interface that enables you to see what was said
Voicemail is a pervasive, but under-researched tool for workplace communication. Despite potential advantages of voicemail over email, current phone-based voicemail UIs are highly...
Steve Whittaker, Richard Davis, Julia Hirschberg, ...
CSCW
2000
ACM
15 years 4 months ago
Providing presence cues to telephone users
A significant problem with telephone communication is that callers do not have enough awareness about the Personal Presence of people they want to call. The result can be unwanted...
Allen E. Milewski, Thomas M. Smith
IUI
2010
ACM
15 years 4 months ago
Automatic generation of research trails in web history
We propose the concept of research trails to help web users create and reestablish context across fragmented research processes without requiring them to explicitly structure and ...
Elin Rønby Pedersen, Karl Gyllstrom, Shengy...