Sciweavers

16 search results - page 2 / 4
» Speaking of Privacy
Sort
View
PROVSEC
2009
Springer
15 years 4 months ago
Chosen-Ciphertext Secure RSA-Type Cryptosystems
This paper explains how to design fully secure RSA-type cryptosystems from schemes only secure against passive attacks, in the standard model. We rely on instance-independence assu...
Benoît Chevallier-Mames, Marc Joye
SP
2000
IEEE
121views Security Privacy» more  SP 2000»
15 years 1 months ago
A Security Infrastructure for Distributed Java Applications
We describe the design and implementation of a security infrastructure for a distributed Java application. This work is inspired by SDSI/SPKI, but has a few twists of its own. We ...
Dirk Balfanz, Drew Dean, Mike Spreitzer
AGENTS
1997
Springer
15 years 1 months ago
Yenta: A Multi-Agent, Referral-Based Matchmaking System
Many important and useful applications for software agents require multiple agents on a network that communicate with each other. Such agents must find each other and perform a u...
Leonard N. Foner
AGENTS
1997
Springer
15 years 1 months ago
Story-Making with Improvisational Puppets
"Improv Puppets'' is an interaction paradigm modeled after traditional puppet play. With physical puppets, children move their puppets' bodies and speak their ...
Barbara Hayes-Roth, Robert van Gent
ISI
2005
Springer
15 years 3 months ago
Selective Fusion for Speaker Verification in Surveillance
This paper presents an improved speaker verification technique that is especially appropriate for surveillance scenarios. The main idea is a metalearning scheme aimed at improving ...
Yosef A. Solewicz, Moshe Koppel