Sciweavers

1228 search results - page 237 / 246
» Manipulation of Pose Distributions
Sort
View
RAID
1999
Springer
15 years 1 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield
ELPUB
1998
ACM
15 years 1 months ago
Towards an Information-Rich Society? Or an Information-Overloaded One? (Is the Media Becoming More Important Than the Message?)
The rapid growth in all forms of electronic publishing is creating many new problems – both technical and socio-economic. This paper examines some of these from three different ...
T. M. R. Ellis
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
15 years 1 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
FODO
1989
Springer
164views Algorithms» more  FODO 1989»
15 years 1 months ago
ITOSS: An Integrated Toolkit For Operating System Security
d Abstract) Michael Rabin Aiken Computation Laboratory Harvard University Cambridge, MA 02138 J. D. Tygar School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213...
Michael O. Rabin, J. D. Tygar
PET
2010
Springer
15 years 1 months ago
How Unique Is Your Web Browser?
We investigate the degree to which modern web browsers are subject to “device fingerprinting” via the version and configuration information that they will transmit to website...
Peter Eckersley