Sciweavers

4731 search results - page 205 / 947
» Securing Interactive Programs
Sort
View
WECWIS
2005
IEEE
116views ECommerce» more  WECWIS 2005»
15 years 7 months ago
Security and Privacy Using One-Round Zero-Knowledge Proofs
A zero-knowledge proof (ZKP) is an interactive proof that allows a prover to prove the knowledge of a secret to a verifier without revealing it. ZKPs are powerful tools to deal wi...
Sultan Almuhammadi, Clifford Neuman
153
Voted
DEXAW
2006
IEEE
123views Database» more  DEXAW 2006»
15 years 6 months ago
Privacy, Security and Trust in P2P environments: A Perspective
The Peer-to-Peer (P2P) paradigm of computing has been growing dramatically in popularity over the last decade. Consequently, large amounts of data are being shared among P2P users...
Anirban Mondal, Masaru Kitsuregawa
DBSEC
2010
129views Database» more  DBSEC 2010»
15 years 3 months ago
Secure Outsourcing of DNA Searching via Finite Automata
This work treats the problem of error-resilient DNA searching via oblivious evaluation of finite automata, formulated as follows: a client has a DNA sequence, and a service provid...
Marina Blanton, Mehrdad Aliasgari
ICNS
2006
IEEE
15 years 8 months ago
Building Distributed Access Control System Using Service-Oriented Programming Model
– Service-Oriented Programming Model is a new methodology for building service-oriented applications. In the Service-Oriented Programming Model, an application is assembled from ...
Ivan Zuzak, Sinisa Srbljic, Ivan Benc
AGENTS
2000
Springer
15 years 6 months ago
Put your best face forward: anthropomorphic agents, e-commerce consumers, and the law
Highly believable anthropomorphic agents endanger electronic consumers. Because of concerning tendencies in human-agent interaction arising from agents’ anthropomorphic qualitie...
Carey Heckman, Jacob O. Wobbrock