Sciweavers

5722 search results - page 90 / 1145
» Security Function Interactions
Sort
View
112
Voted
FOCS
2010
IEEE
14 years 10 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
95
Voted
PUC
2006
72views more  PUC 2006»
15 years 22 days ago
Towards self-protecting ubiquitous systems: monitoring trust-based interactions
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches...
Colin English, Sotirios Terzis, Paddy Nixon
90
Voted
CHI
2010
ACM
15 years 7 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...
ICICS
2004
Springer
15 years 6 months ago
On the Minimal Assumptions of Group Signature Schemes
Abstract. One of the central lines of cryptographic research is identifying the weakest assumptions required for the construction of secure primitives. In the context of group sign...
Michel Abdalla, Bogdan Warinschi
IJCAI
2007
15 years 2 months ago
An Experience on Reputation Models Interoperability Based on a Functional Ontology
Interaction between heterogeneous agents can raise some problems since agents may not use the same models and concepts. Therefore, the use of some mechanisms to achieve interoperab...
Laurent Vercouter, Sara J. Casare, Jaime Sim&atild...