Sciweavers

1888 search results - page 197 / 378
» Proof theory and computational analysis
Sort
View
108
Voted
CCS
2008
ACM
15 years 2 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
CCS
2010
ACM
15 years 1 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
FOCS
2010
IEEE
14 years 10 months ago
The Limits of Two-Party Differential Privacy
We study differential privacy in a distributed setting where two parties would like to perform analysis of their joint data while preserving privacy for both datasets. Our results ...
Andrew McGregor, Ilya Mironov, Toniann Pitassi, Om...
102
Voted
CHI
2007
ACM
16 years 1 months ago
Decision-making strategies in design meetings
This project aims to further our understanding of the practice of user-centered design (UCD) by observing the argumentation strategies used by designers in faceto-face meetings in...
Erin Friess
ICMI
2007
Springer
215views Biometrics» more  ICMI 2007»
15 years 7 months ago
Visual inference of human emotion and behaviour
We address the problem of automatic interpretation of nonexaggerated human facial and body behaviours captured in video. We illustrate our approach by three examples. (1) We intro...
Shaogang Gong, Caifeng Shan, Tao Xiang