Sciweavers

404 search results - page 18 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
NDSS
2006
IEEE
15 years 3 months ago
Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorit
Volunteer distributed computations utilize spare processor cycles of personal computers that are connected to the Internet. The resulting platforms provide computational power pre...
Doug Szajda, Michael Pohl, Jason Owen, Barry G. La...
AUSFORENSICS
2004
14 years 11 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
CHI
2010
ACM
15 years 4 months ago
Visual vs. compact: a comparison of privacy policy interfaces
In this paper, we compare the impact of two different privacy policy representations – AudienceView and Expandable Grids – on users modifying privacy policies for a social net...
Heather Richter Lipford, Jason Watson, Michael Whi...
ICSM
2005
IEEE
15 years 3 months ago
An Empirical Comparison of Test Suite Reduction Techniques for User-Session-Based Testing of Web Applications
Automated cost-effective test strategies are needed to provide reliable, secure, and usable web applications. As a software maintainer updates an application, test cases must accu...
Sara Sprenkle, Sreedevi Sampath, Emily Gibson, Lor...
MSS
2005
IEEE
136views Hardware» more  MSS 2005»
15 years 3 months ago
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redund
Modern storage systems are responsible for increasing amounts of data and the value of the data itself is growing in importance. Several primary storage system solutions have emer...
Joseph Tucek, Paul Stanton, Elizabeth Haubert, Rag...