Sciweavers

562 search results - page 81 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
JCS
2011
72views more  JCS 2011»
14 years 10 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
NDSS
2003
IEEE
15 years 9 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
109
Voted
CHI
2005
ACM
16 years 4 months ago
ImproViz: visual explorations of jazz improvisations
ImproViz is a visualization technique for diagramming music that brings to light the signature patterns of a jazz musician's improvisational style. ImproViz consists of two p...
Jon Snydal, Marti A. Hearst
110
Voted
ISI
2004
Springer
15 years 9 months ago
A Tool for Internet Chatroom Surveillance
Internet chatrooms are common means of interaction and communications, and they carry valuable information about formal or ad-hoc formation of groups with diverse objectives. This ...
Seyit Ahmet Çamtepe, Mukkai S. Krishnamoort...
CHIMIT
2009
ACM
15 years 10 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...