Sciweavers

5722 search results - page 453 / 1145
» Security Function Interactions
Sort
View
FC
2006
Springer
108views Cryptology» more  FC 2006»
15 years 8 months ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion
152
Voted
JUCS
2008
166views more  JUCS 2008»
15 years 4 months ago
ASM Refinement Preserving Invariants
: This paper gives a definition of ASM refinement suitable for the verification that a protocol implements atomic transactions. We used this definition as the basis of the formal v...
Gerhard Schellhorn
175
Voted
JOC
2007
133views more  JOC 2007»
15 years 4 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
COST
2007
Springer
95views Multimedia» more  COST 2007»
15 years 10 months ago
On the Use of NonVerbal Speech Sounds in Human Communication
Recent work investigating the interaction of the speech signal with the meaning of the verbal content has revealed interactions not yet modelled in either speech recognition techn...
Nick Campbell
133
Voted
HUC
2003
Springer
15 years 9 months ago
Social Network Computing
Abstract. A ubiquitous wearable computing infrastructure is now firmly entrenched within organizations across the globe, yet much of its potential remains untapped. This paper desc...
Nathan Eagle, Alex Pentland