Sciweavers

6164 search results - page 860 / 1233
» Teaching Computer Security
Sort
View
CHI
2007
ACM
16 years 5 months ago
The impact of digital iconic realism on anonymous interactants' mobile phone communication
In this paper, I describe progress in research designed to explore the effect of the combination of behavioral and visual fidelity of avatars on users' social presence in syn...
Sin-Hwa Kang
DCC
2006
IEEE
16 years 4 months ago
A Fuzzy Vault Scheme
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret value in a fuzzy vault and "lock" it using ...
Ari Juels, Madhu Sudan
CLOUDCOM
2009
Springer
15 years 11 months ago
Accountability as a Way Forward for Privacy Protection in the Cloud
: The issue of how to provide appropriate privacy protection for cloud computing is important, and as yet unresolved. In this paper we propose an approach in which procedural and t...
Siani Pearson, Andrew Charlesworth
133
Voted
COCO
2009
Springer
113views Algorithms» more  COCO 2009»
15 years 11 months ago
Are PCPs Inherent in Efficient Arguments?
Starting with Kilian (STOC ‘92), several works have shown how to use probabilistically checkable proofs (PCPs) and cryptographic primitives such as collision-resistant hashing to...
Guy N. Rothblum, Salil P. Vadhan
SAGT
2009
Springer
192views Game Theory» more  SAGT 2009»
15 years 11 months ago
Learning and Approximating the Optimal Strategy to Commit To
Computing optimal Stackelberg strategies in general two-player Bayesian games (not to be confused with Stackelberg strategies in routing games) is a topic that has recently been ga...
Joshua Letchford, Vincent Conitzer, Kamesh Munagal...