Sciweavers

1005 search results - page 11 / 201
» Practical Secure Function Evaluation
Sort
View
120
Voted
EUROCRYPT
1999
Springer
15 years 4 months ago
Software Performance of Universal Hash Functions
Abstract. This paper compares the parameters sizes and software performance of several recent constructions for universal hash functions: bucket hashing, polynomial hashing, Toepli...
Wim Nevelsteen, Bart Preneel
100
Voted
AWIC
2003
Springer
15 years 5 months ago
Secure Intelligent Agents Based on Formal Description Techniques
This paper describes a practical solution for the incorporation of security services in agents. From a set of basic user requirements, the agents will be able to find out the best ...
L. Mengual, C. de la Puente
116
Voted
JCDL
2005
ACM
111views Education» more  JCDL 2005»
15 years 6 months ago
Developing practical automatic metadata assignment and evaluation tools for internet resources
This paper describes the development of practical automatic metadata assignment tools to support automatic record creation for virtual libraries, metadata repositories and digital...
Gordon W. Paynter
91
Voted
EUROPLOP
2006
15 years 1 months ago
Securing the Broker Pattern
We consider how to add security to the Broker distribution pattern. We do so by examining how systems using Broker are secured in practice, and by then revising the pattern to ref...
Patrick Morrison, Eduardo B. Fernandez
94
Voted
VVS
2000
IEEE
130views Visualization» more  VVS 2000»
15 years 4 months ago
A practical evaluation of popular volume rendering algorithms
This paper evaluates and compares four volume rendering algorithms that have become rather popular for rendering datasets described on uniform rectilinear grids: raycasting, splat...
Michael Meißner, Jian Huang, Dirk Bartz, Kla...