Sciweavers

3486 search results - page 591 / 698
» On the Design and Security of RC2
Sort
View
SOUPS
2010
ACM
15 years 3 months ago
Feasibility of structural network clustering for group-based privacy control in social networks
Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, group...
Simon Jones, Eamonn O'Neill
SP
2010
IEEE
192views Security Privacy» more  SP 2010»
15 years 3 months ago
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation
—Captchas are designed to be easy for humans but hard for machines. However, most recent research has focused only on making them hard for machines. In this paper, we present wha...
Elie Bursztein, Steven Bethard, Celine Fabry, John...
COLCOM
2009
IEEE
15 years 3 months ago
An IT appliance for remote collaborative review of mechanisms of injury to children in motor vehicle crashes
This paper describes the architecture and implementation of a Java-based appliance for collaborative review of crashes involving injured children in order to determine mechanisms o...
Mahendra Kumar, Richard E. Newman, José For...
EUROCRYPT
2004
Springer
15 years 2 months ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
103
Voted
FPGA
2004
ACM
163views FPGA» more  FPGA 2004»
15 years 2 months ago
Time and area efficient pattern matching on FPGAs
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
Zachary K. Baker, Viktor K. Prasanna