Sciweavers

348 search results - page 43 / 70
» Secure Computation on the Web: Computing without Simultaneou...
Sort
View
DRM
2007
Springer
15 years 8 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
131
Voted
VL
2008
IEEE
171views Visual Languages» more  VL 2008»
15 years 8 months ago
Usability challenges for enterprise service-oriented architecture APIs
An important part of many programming tasks is the use of libraries and other forms of Application Programming Interfaces (APIs). Programming via web services using a Service-Orie...
Jack Beaton, Sae Young Jeong, Yingyu Xie, Jeffrey ...
HCI
2009
14 years 11 months ago
User Research and User Centered Design; Designing, Developing, and Commercializing Widget Service on Mobile Handset
Mobile widget is a new paradigm for interactive idle screen service on mobile handset. Currently the standardization of widget is being discussed by W3C; Widget is globally accepte...
Sung Moo Hong
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
16 years 2 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
USITS
1997
15 years 3 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz