Sciweavers

6195 search results - page 122 / 1239
» Cloud Computing Security
Sort
View
CCS
2011
ACM
14 years 4 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum
ACSAC
2004
IEEE
15 years 7 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
TCC
2005
Springer
88views Cryptology» more  TCC 2005»
15 years 9 months ago
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation
Definition of security under the framework of Environmental Security (a.k.a Network-Aware Security or Universally Composable Security) typically requires “extractability” of t...
Manoj Prabhakaran, Amit Sahai
GFKL
2005
Springer
82views Data Mining» more  GFKL 2005»
15 years 9 months ago
Robust Multivariate Methods: The Projection Pursuit Approach
Projection pursuit was originally introduced to identify structures in multivariate data clouds (Huber, 1985). The idea of projecting data to a lowdimensional subspace can also be ...
Peter Filzmoser, Sven Serneels, Christophe Croux, ...
PG
2003
IEEE
15 years 9 months ago
Neural Meshes: Statistical Learning Based on Normals
We present a method for the adaptive reconstruction of a surface directly from an unorganized point cloud. The algorithm is based on an incrementally expanding Neural Network and ...
Won-Ki Jeong, Ioannis P. Ivrissimtzis, Hans-Peter ...