Sciweavers

3210 search results - page 106 / 642
» Secure Similarity Search
Sort
View
137
Voted
SIGMOD
2004
ACM
188views Database» more  SIGMOD 2004»
16 years 5 months ago
Online Event-driven Subsequence Matching over Financial Data Streams
Subsequence similarity matching in time series databases is an important research area for many applications. This paper presents a new approximate approach for automatic online s...
Huanmei Wu, Betty Salzberg, Donghui Zhang
151
Voted
IACR
2011
133views more  IACR 2011»
14 years 4 months ago
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings
Barreto-Lynn-Scott (BLS) curves are a stand-out candidate for implementing high-security pairings. This paper shows that particular choices of the pairing-friendly search parameter...
Craig Costello, Kristin Lauter, Michael Naehrig
121
Voted
TAPSOFT
1997
Springer
15 years 9 months ago
A Type-Based Approach to Program Security
This paper presents a type system which guarantees that well-typed programs in a procedural programming language satisfy a noninterference security property. With all program input...
Dennis M. Volpano, Geoffrey Smith
INFORMATICALT
2000
120views more  INFORMATICALT 2000»
15 years 4 months ago
Mobile Code Alternatives for Secure Environments
Growing popularity of the mobile code requires to consider various aspects related to its security. In the aviation industry there is a case when additional information needs to be...
Algirdas Pakstas, Igor Shagaev
CCS
2006
ACM
15 years 8 months ago
Measuring the attack surfaces of two FTP daemons
Software consumers often need to choose between different software that provide the same functionality. Today, security is a quality that many consumers, especially system adminis...
Pratyusa K. Manadhata, Jeannette M. Wing, Mark Fly...