Sciweavers

17298 search results - page 3128 / 3460
» Abstract computing machines
Sort
View
ICISC
2003
89views Cryptology» more  ICISC 2003»
15 years 6 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
PST
2004
15 years 6 months ago
Familiarity and Trust: Measuring Familiarity with a Web Site
Abstract-- This work aims at measuring familiarity to contribute to the formalization of trust. Trust has always been bundled with familiarity to become a popular topic in the area...
Jie Zhang, Ali A. Ghorbani
SDM
2004
SIAM
194views Data Mining» more  SDM 2004»
15 years 6 months ago
Finding Frequent Patterns in a Large Sparse Graph
Graph-based modeling has emerged as a powerful abstraction capable of capturing in a single and unified framework many of the relational, spatial, topological, and other characteri...
Michihiro Kuramochi, George Karypis
141
Voted
SEBD
2004
139views Database» more  SEBD 2004»
15 years 6 months ago
A New Histogram-based Technique for Compressing Multi-Dimensional Data
Abstract. The need to compress data into synopses of summarized information often arises in many application scenarios, where the aim is to retrieve aggregate data efficiently, pos...
Filippo Furfaro, Giuseppe M. Mazzeo, Domenico Sacc...
132
Voted
SEC
2004
15 years 6 months ago
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks
Abstract--Stack smashing is still one of the most popular techniques for computer system attack. In this work, we present an antistack-smashing defense technique for Microsoft Wind...
Danny Nebenzahl, Avishai Wool
« Prev « First page 3128 / 3460 Last » Next »