Sciweavers

562 search results - page 98 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
116
Voted
EUROSYS
2009
ACM
16 years 23 days ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conď¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
152
Voted
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 9 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
162
Voted
MOBISYS
2008
ACM
16 years 3 months ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...
140
Voted
TEI
2010
ACM
179views Hardware» more  TEI 2010»
15 years 10 months ago
Feeling the beat where it counts: fostering multi-limb rhythm skills with the haptic drum kit
This paper introduces a tool known as the Haptic Drum Kit, which employs four computer-controlled vibrotactile devices, one attached to each wrist and ankle. In the applications d...
Simon Holland, Anders J. Bouwer, Mathew Dalgelish,...
132
Voted
CODES
2006
IEEE
15 years 9 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White