Sciweavers

562 search results - page 71 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
137
Voted
CCS
2007
ACM
15 years 10 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
CCS
2006
ACM
15 years 7 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
FOCS
2007
IEEE
15 years 10 months ago
Cryptography from Sunspots: How to Use an Imperfect Reference String
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
Ran Canetti, Rafael Pass, Abhi Shelat
110
Voted
ICCS
2004
Springer
15 years 9 months ago
Collaborative Teleradiology
The paper introduces a notion of collaborative teleradiology as a novel organisation of information exchange during a remote radiological consultation. A general interaction patter...
Krzysztof Zielinski, Jacek Cala, Lukasz Czekierda,...
CORR
2011
Springer
133views Education» more  CORR 2011»
14 years 7 months ago
An Extended Framework for Measuring the Information Capacity of the Human Motor System
—Fitts’ law is a fundamental tool in measuring the capacity of the human motor system. It measures information throughput in terms of the tradeoff between the speed and accurac...
Teemu Roos, Antti Oulasvirta