Sciweavers

2648 search results - page 343 / 530
» Human Factors In Computer Security
Sort
View
146
Voted
SAC
2008
ACM
15 years 2 months ago
A biologically inspired generation of virtual characters
A number of techniques for generating geometric models of human head and body are in use nowadays. Models of human characters are useful in computer games, virtual reality, and ma...
Roberto C. Cavalcante Vieira, Creto Augusto Vidal,...
131
Voted
HUC
2010
Springer
15 years 1 months ago
Locaccino: a privacy-centric location sharing application
Locaccino is a location sharing application designed to empower users to effectively control their privacy. It has been piloted by close to 2000 users and has been used by researc...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...
130
Voted
ACSC
2008
IEEE
15 years 9 months ago
Privacy preserving set intersection based on bilinear groups
We propose a more efficient privacy preserving set intersection protocol which improves the previously known result by a factor of O(N) in both the computation and communication c...
Yingpeng Sang, Hong Shen
159
Voted
DFN
2003
15 years 4 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
136
Voted
FSE
1997
Springer
131views Cryptology» more  FSE 1997»
15 years 7 months ago
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor
Most encryption algorithms are designed without regard to their performance on top-of-the-line microprocessors. This paper discusses general optimization principles algorithms desi...
Bruce Schneier, Doug Whiting