Sciweavers

5722 search results - page 272 / 1145
» Security Function Interactions
Sort
View
IVA
2007
Springer
15 years 9 months ago
Analyzing Gaze During Face-to-Face Interaction
We present here the analysis of multimodal data gathered during realistic face-to-face interaction of a target speaker with a number of interlocutors. Videos and gaze have been mon...
Stephan Raidt, Gérard Bailly, Fréd&e...
133
Voted
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
15 years 9 months ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen
OOPSLA
2004
Springer
15 years 8 months ago
RAIL: code instrumentation for .NET
Code instrumentation is a mechanism that allows modules of programs to be completely rewritten at runtime. With the advent of virtual machines, this type of functionality is becom...
Bruno Cabral, Paulo Marques, Luís Moura Sil...
CRYPTO
2008
Springer
93views Cryptology» more  CRYPTO 2008»
15 years 5 months ago
Distributed Private Data Analysis: Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs
Amos Beimel, Kobbi Nissim, Eran Omri
BMCBI
2008
95views more  BMCBI 2008»
15 years 3 months ago
Mining protein networks for synthetic genetic interactions
Background: The local connectivity and global position of a protein in a protein interaction network are known to correlate with some of its functional properties, including its e...
Sri R. Paladugu, Shan Zhao, Animesh Ray, Alpan Rav...