Sciweavers

5722 search results - page 348 / 1145
» Security Function Interactions
Sort
View
124
Voted
PRESENCE
2000
127views more  PRESENCE 2000»
15 years 3 months ago
Interactions in Perceived Quality of Auditory-Visual Displays
The quality of realism in virtual environments (VEs) is typically considered to be a function of visual and audio fidelity mutually exclusive of each other. However, the VE partic...
Russell L. Storms, Michael Zyda
165
Voted
GROUP
2010
ACM
15 years 1 months ago
Enhancing group recommendation by incorporating social relationship interactions
Group recommendation, which makes recommendations to a group of users instead of individuals, has become increasingly important in both the workspace and people's social acti...
Mike Gartrell, Xinyu Xing, Qin Lv, Aaron Beach, Ri...
122
Voted
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
16 years 4 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...
145
Voted
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 10 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
156
Voted
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz