Sciweavers

1757 search results - page 120 / 352
» Secure Content Validation
Sort
View
117
Voted
IACR
2011
97views more  IACR 2011»
14 years 3 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen
ISCA
2012
IEEE
248views Hardware» more  ISCA 2012»
13 years 5 months ago
Watchdog: Hardware for safe and secure manual memory management and full memory safety
Languages such as C and C++ use unsafe manual memory management, allowing simple bugs (i.e., accesses to an object after deallocation) to become the root cause of exploitable secu...
Santosh Nagarakatte, Milo M. K. Martin, Steve Zdan...
ICMCS
2005
IEEE
103views Multimedia» more  ICMCS 2005»
15 years 9 months ago
User Study for Generating Personalized Summary Profiles
The need for personalized summaries of media content has been driven by the recent and anticipated explosive growth in the media world. In this paper we present a methodology and ...
Lalitha Agnihotri, John R. Kender, Nevenka Dimitro...
CHI
2010
ACM
15 years 2 months ago
Social tagging revamped: supporting the users' need of self-promotion through persuasive techniques
People share pictures online to increase their social presence. However, recent studies have shown that most of the content shared in social networks is not looked at by peers. Pr...
Mauro Cherubini, Alejandro Gutierrez, Rodrigo de O...
SAC
2009
ACM
15 years 10 months ago
Prestige-based peer sampling service: interdisciplinary approach to secure gossip
The Peer Sampling Service (PSS) has been proposed as a method to initiate and maintain the set of connections between nodes in unstructured peer to peer (P2P) networks. The PSS us...
Gian Paolo Jesi, Edoardo Mollona, Srijith K. Nair,...