Sciweavers

5273 search results - page 126 / 1055
» Secured Web Access
Sort
View
104
Voted
SOSP
2007
ACM
15 years 10 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
W4A
2005
ACM
15 years 7 months ago
What's the web like if you can't see it?
Awareness of Web accessibility is spreading all over the world among Web designers and developers, due to regulations such as the US law called Section 508 and guidelines like the...
Chieko Asakawa
APWEB
2010
Springer
15 years 6 months ago
Optimizing Query Processing for the Hidden Web
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
Andrea Calì, Davide Martinenghi
ICALT
2010
IEEE
14 years 11 months ago
Synote: Designed for all Advanced Learning Technology for Disabled and Non-Disabled People
This paper describes the development and evaluation of Synote, a freely available accessible web based application that makes multimedia web resources (e.g. podcasts) easier to ac...
Mike Wald
CTRSA
2008
Springer
110views Cryptology» more  CTRSA 2008»
15 years 3 months ago
RFID Security: Tradeoffs between Security and Efficiency
Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and onl...
Ivan Damgård, Michael Østergaard Pede...