Sciweavers

6164 search results - page 867 / 1233
» Teaching Computer Security
Sort
View
DCC
2000
IEEE
15 years 4 months ago
Discrete Logarithms: The Past and the Future
The first practical public key cryptosystem to be published, the Diffie-Hellman key exchange algorithm, was based on the assumption that discrete logarithms are hard to compute. T...
Andrew M. Odlyzko
BMVC
2010
15 years 3 months ago
Object Recognition using 3D SIFT in Complex CT Volumes
The automatic detection of objects within complex volumetric imagery is becoming of increased interest due to the use of dual energy Computed Tomography (CT) scanners as an aviati...
Gregory T. Flitton, Toby P. Breckon, Najla Megherb...
CCR
2010
97views more  CCR 2010»
15 years 2 months ago
On building special-purpose social networks for emergency communication
In this paper we propose a system that will allow people to communicate their status with friends and family when they find themselves caught up in a large disaster (e.g., sending...
Mark Allman
CORR
2011
Springer
195views Education» more  CORR 2011»
15 years 9 hour ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
141
Voted
PODC
2011
ACM
14 years 7 months ago
Sustaining collaboration in multicast despite rational collusion
This paper focuses on designing incentive mechanisms for overlay multicast systems. Existing proposals on the problem are no longer able to provide proper incentives when rational...
Haifeng Yu, Phillip B. Gibbons, Chenwei Shi