Sciweavers

6195 search results - page 1104 / 1239
» Cloud Computing Security
Sort
View
MIDDLEWARE
2004
Springer
15 years 10 months ago
PoliPer: policies for mobile and pervasive environments
The need for sharing is well known in a large number of distributed applications. These applications are difficult to develop either for fully wired or mobile wireless networks. ...
Luís Veiga, Paulo Ferreira
150
Voted
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
15 years 10 months ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
139
Voted
WPES
2003
ACM
15 years 10 months ago
Reusable anonymous return channels
Mix networks are used to deliver messages anonymously to recipients, but do not straightforwardly allow the recipient of an anonymous message to reply to its sender. Yet the abili...
Philippe Golle, Markus Jakobsson
149
Voted
DRM
2003
Springer
15 years 10 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia
ACSAC
2002
IEEE
15 years 10 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
« Prev « First page 1104 / 1239 Last » Next »