Sciweavers

1597 search results - page 34 / 320
» Mental Models of Computer Security
Sort
View
STOC
2004
ACM
153views Algorithms» more  STOC 2004»
16 years 2 months ago
Bounded-concurrent secure multi-party computation with a dishonest majority
We show how to securely realize any multi-party functionality in a way that preserves security under an a-priori bounded number of concurrent executions, regardless of the number ...
Rafael Pass
118
Voted
COMPSAC
2000
IEEE
15 years 6 months ago
Chinese Wall Security Model and Conflict Analysis
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
Tsau Young Lin
CHI
2003
ACM
16 years 2 months ago
Personal media exploration with semantic regions
Computer users deal with large amount of personal media data and they often face problems in managing and exploring them. The paper presents an innovative approach, Semantic Regio...
Hyunmo Kang
136
Voted
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz
127
Voted
AGENTS
2001
Springer
15 years 6 months ago
Social role awareness in animated agents
This paper promotes social role awareness as a desirable capability of animated agents, that are by now strong affective reasoners, but otherwise often lack the social competence ...
Helmut Prendinger, Mitsuru Ishizuka