Sciweavers

1242 search results - page 5 / 249
» Digital Objects as Passwords
Sort
View
WSC
1998
14 years 11 months ago
An Architectural Design for Digital Objects
We define the term "digital object" and specify a variety of qualities that are important during the object design phase. A digital object contains a set of models, and ...
Paul A. Fishwick
STOC
2010
ACM
193views Algorithms» more  STOC 2010»
15 years 1 months ago
Privacy Amplification with Asymptotically Optimal Entropy Loss
We study the problem of "privacy amplification": key agreement between two parties who both know a weak secret w, such as a password. (Such a setting is ubiquitous on th...
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostr...
ECOOPW
2006
Springer
15 years 1 months ago
Program Analysis for Security and Privacy
Abstract. Software security has become more important than ever. Unfortunately, still now, the security of a software system is almost always retrofitted to an afterthought. When s...
Marco Pistoia, Francesco Logozzo
JMIV
1998
124views more  JMIV 1998»
14 years 9 months ago
Preserving Topology by a Digitization Process
The main task of digital image processing is to recognize properties of real objects based on their digital images. These images are obtained by some sampling device, like a CCD c...
Longin Jan Latecki, Christopher Conrad, Ari D. Gro...
92
Voted
DRM
2006
Springer
15 years 1 months ago
Verifiable digital object identity system
Identification is a two part system comprising of a token or label (an identifier) that can be used to reference an entity and a process that can be used to create label-entity as...
Alapan Arnab, Andrew Hutchison