Sciweavers

24529 search results - page 250 / 4906
» Computing on Authenticated Data
Sort
View
NDSS
2008
IEEE
15 years 10 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decade...
Ji Sun Shin, Virgil D. Gligor
ACSC
2007
IEEE
15 years 10 months ago
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks
Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber sub...
Amy Beth Corman, Peter Schachte, Vanessa Teague
159
Voted
MMSEC
2005
ACM
137views Multimedia» more  MMSEC 2005»
15 years 9 months ago
A fragile watermarking scheme for 3D meshes
In this paper, we propose a new fragile watermarking scheme for 3D meshes. Firstly, the watermark information is adaptively embedded into the mesh geometry by slightly adjusting t...
Hao-Tian Wu, Yiu-ming Cheung
139
Voted
EGC
2005
Springer
15 years 9 months ago
The University of Virginia Campus Grid: Integrating Grid Technologies with the Campus Information Infrastructure
Abstract. Grid software often unfortunately requires significant changes in existing infrastructure, both in terms of policy and mechanism, instead of accommodating and leveraging ...
Marty Humphrey, Glenn S. Wasson
136
Voted
NDSS
1998
IEEE
15 years 7 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu