Sciweavers

6047 search results - page 1109 / 1210
» Modeling with Extend
Sort
View
FOCS
2007
IEEE
15 years 8 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 8 months ago
An Empirical Analysis of Fraud Detection in Online Auctions: Credit Card Phantom Transaction
The online auction is a well-known business model that shows how business can be changed with the aid of new technologies. On the other hand, although the online auction allows bu...
Myungsin Chae, Seonyoung Shim, Hyungjun Cho, Byung...
CIVR
2007
Springer
138views Image Analysis» more  CIVR 2007»
15 years 8 months ago
SemRetriev: an ontology driven image retrieval system
This paper describes the technical details of SemRetriev, a prototype system for image retrieval which combines the use of an ontology which structures an image repository and of ...
Adrian Popescu, Pierre-Alain Moëllic, Christo...
OOPSLA
2007
Springer
15 years 7 months ago
Ilea: inter-language analysis across java and c
Java bug finders perform static analysis to find implementation mistakes that can lead to exploits and failures; Java compilers perform static analysis for optimization. If Java...
Gang Tan, Greg Morrisett
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
15 years 7 months ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...
« Prev « First page 1109 / 1210 Last » Next »