Sciweavers

270 search results - page 30 / 54
» Building Software Securely from the Ground Up
Sort
View
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
14 years 11 months ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
WWW
2008
ACM
15 years 10 months ago
Analyzing search engine advertising: firm behavior and cross-selling in electronic markets
The phenomenon of sponsored search advertising is gaining ground as the largest source of revenues for search engines. Firms across different industries have are beginning to adop...
Anindya Ghose, Sha Yang
WPES
2003
ACM
15 years 3 months ago
Privacy preserving database application testing
Traditionally, application software developers carry out their tests on their own local development databases. However, such local databases usually have only a small number of sa...
Xintao Wu, Yongge Wang, Yuliang Zheng
FGR
2008
IEEE
227views Biometrics» more  FGR 2008»
15 years 4 months ago
Ambient intelligence as the bridge to the future of pervasive computing
One prediction about this future of pervasive technology is that people will carry the tools needed to interface with technological resources sprinkled through out the environment...
Christopher Richard Wren, Yuri A. Ivanov
APSEC
2002
IEEE
15 years 2 months ago
Evaluating the Scalability of Enterprise JavaBeans Technology
One of the major problems in building large-scale distributed systems is to anticipate the performance of the eventual solution before it has been built. This problem is especiall...
Yan (Jenny) Liu, Ian Gorton, Anna Liu, Shiping Che...