Sciweavers

6195 search results - page 1174 / 1239
» Cloud Computing Security
Sort
View
ACISP
2009
Springer
15 years 11 months ago
Inside the Hypercube
Bernstein’s CubeHash is a hash function family that includes four functions submitted to the NIST Hash Competition. A CubeHash function is parametrized by a number of rounds r, a...
Jean-Philippe Aumasson, Eric Brier, Willi Meier, M...
AGENTS
1997
Springer
15 years 8 months ago
RoboCup: The Robot World Cup Initiative
The Robot World Cup Initiative (RoboCup) is an attempt to foster AI and intelligent robotics research by providing a standard problem where wide range of technologies can be integ...
Hiroaki Kitano, Minoru Asada, Yasuo Kuniyoshi, Its...
ICPR
2006
IEEE
16 years 5 months ago
A Non-Iterative Approach to Reconstruct Face Templates from Match Scores
Regeneration of biometric templates from match scores has security and privacy implications related to any biometric based authentication system. In this paper, we propose a novel...
Pranab Mohanty, Rangachar Kasturi, Sudeep Sarkar
WWW
2002
ACM
16 years 5 months ago
Protecting electronic commerce from distributed denial-of-service attacks
It is widely recognized that distributed denial-of-service (DDoS) attacks can disrupt electronic commerce and cause large revenue losses. However, effective defenses continue to b...
José Carlos Brustoloni
CHI
2009
ACM
16 years 5 months ago
The effect of affective iconic realism on anonymous interactants' self-disclosure
In this paper, we describe progress in research designed to explore the effect of the combination of avatars' visual fidelity and users' anticipated future interaction o...
Sin-Hwa Kang, Jonathan Gratch, James H. Watt
« Prev « First page 1174 / 1239 Last » Next »