Sciweavers

24529 search results - page 270 / 4906
» Computing on Authenticated Data
Sort
View
JGTOOLS
2006
80views more  JGTOOLS 2006»
15 years 3 months ago
A Fast Method for Local Penetration Depth Computation
In this appendix, we provide some details on the data structures used to cluster the intersection segments. Although the data structures are fairly classical (a heap, a grid and a...
Stephane Redon, Ming C. Lin
NPC
2004
Springer
15 years 9 months ago
A Data-Aware Resource Broker for Data Grids
Huy Le, Paul D. Coddington, Andrew L. Wendelborn
SEC
2008
15 years 5 months ago
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators
In an on-line transaction, a user sends her personal sensitive data (e.g., password) to a server for authentication. This process is known as Single Sign-On (SSO). Subject to phish...
Yongdong Wu, Haixia Yao, Feng Bao
WPES
2003
ACM
15 years 9 months ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
FCCM
2003
IEEE
96views VLSI» more  FCCM 2003»
15 years 9 months ago
Data Search and Reorganization Using FPGAs: Application to Spatial Pointer-based Data Structures
FPGAs have appealing features such as customizable internal and external bandwidth and the ability to exploit vast amounts of fine-grain parallelism. In this paper we explore the ...
Pedro C. Diniz, Joonseok Park