Sciweavers

1054 search results - page 52 / 211
» Secret Communication with Feedback
Sort
View
CHI
2006
ACM
15 years 10 months ago
The impact of delayed visual feedback on collaborative performance
When pairs work together on a physical task, seeing a common workspace benefits their performance and transforms their use of language. Previous results have demonstrated that vis...
Darren Gergle, Robert E. Kraut, Susan R. Fussell
CONCUR
2010
Springer
14 years 11 months ago
Information Flow in Interactive Systems
Abstract. We consider the problem of defining the information leakage in interactive systems where secrets and observables can alternate during the computation. We show that the in...
Mário S. Alvim, Miguel E. Andrés, Ca...
DCC
2011
IEEE
14 years 4 months ago
Some observations on HC-128
In this paper, we use linear approximations of the addition modulo 2n of three n-bit integers to identify linear approximations of g1, g2, the feedback functions of HC-128. This, i...
Subhamoy Maitra, Goutam Paul, Shashwat Raizada, Su...
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
15 years 4 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
SCN
2010
Springer
129views Communications» more  SCN 2010»
14 years 8 months ago
Improved Primitives for Secure Multiparty Integer Computation
We consider a collection of related multiparty computation protocols that provide core operations for secure integer and fixed-point computation. The higher-level protocols offer...
Octavian Catrina, Sebastiaan de Hoogh