Sciweavers

1597 search results - page 36 / 320
» Mental Models of Computer Security
Sort
View
108
Voted
CCS
2007
ACM
15 years 8 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
96
Voted
NORDICHI
2006
ACM
15 years 7 months ago
Affordances and constraints in screen-based musical instruments
The ixi software is an ongoing interdisciplinary research project. It focuses on the creation of screen-based interfaces as digital musical instruments. The notion of situated cog...
Thor Magnusson
HRI
2009
ACM
15 years 8 months ago
Creating and using matrix representations of social interaction
This paper explores the use of an outcome matrix as a computational representation of social interaction suitable for implementation on a robot. An outcome matrix expresses the re...
Alan R. Wagner
168
Voted
FOCS
2003
IEEE
15 years 7 months ago
General Composition and Universal Composability in Secure Multi-Party Computation
Concurrent general composition relates to a setting where a secure protocol is run in a network concurrently with other, arbitrary protocols. Clearly, security in such a setting i...
Yehuda Lindell
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
15 years 6 months ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...