Sciweavers

1458 search results - page 149 / 292
» The sequentially realizable functionals
Sort
View
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
15 years 7 months ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth
ASIACRYPT
2006
Springer
15 years 7 months ago
On the Security of OAEP
Currently, the best and only evidence of the security of the OAEP encryption scheme is a proof in the contentious random oracle model. Here we give further arguments in support of...
Alexandra Boldyreva, Marc Fischlin
102
Voted
HCI
2007
15 years 5 months ago
Designing Smart Living Objects - Enhancing vs. Distracting Traditional Human-Object Interaction
Abstract. To realize Weiser’s vision of ubiquitous computing, a popular approach has been to create so-called smart living objects, which are everyday objects in our living envir...
Pei-yu Chi, Jen-hao Chen, Shih-yen Liu, Hao-Hua Ch...
ICWN
2008
15 years 5 months ago
A Framework of Authentic Post-Issuance Program Modification for Multi-Application Smart Cards
Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In t...
Mohammad Mesbah Uddin, Salahuddin Muhammad Salim Z...
SDM
2003
SIAM
148views Data Mining» more  SDM 2003»
15 years 5 months ago
ATLaS: A Native Extension of SQL for Data Mining
A lack of power and extensibility in their query languages has seriously limited the generality of DBMSs and hampered their ability to support data mining applications. Thus, ther...
Haixun Wang, Carlo Zaniolo