Sciweavers

562 search results - page 73 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
CHI
2010
ACM
15 years 9 months ago
Cultural difference in image tagging
Do people from different cultures tag digital images differently? The current study compared the content of tags for digital images created by two cultural groups: European Americ...
Wei Dong, Wai-Tat Fu
MOBISYS
2011
ACM
14 years 6 months ago
Analyzing inter-application communication in Android
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provid...
Erika Chin, Adrienne Porter Felt, Kate Greenwood, ...
CCR
2000
101views more  CCR 2000»
15 years 3 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
SWS
2004
ACM
15 years 9 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 7 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...