Sciweavers

14824 search results - page 2894 / 2965
» Security - Introduction
Sort
View
SIGGRAPH
2010
ACM
15 years 2 months ago
Camera-less Smart Laser Projector
We introduce here our latest ‘smart laser projector’ prototype, i.e, a modified laser-based projector capable of augmenting all kind of surfaces while simultaneously using th...
Álvaro Cassinelli, Alexis Zerroug, Yoshihir...
91
Voted
SIGIR
2010
ACM
15 years 2 months ago
Uncovering social spammers: social honeypots + machine learning
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advert...
Kyumin Lee, James Caverlee, Steve Webb
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
15 years 2 months ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
EUROSYS
2009
ACM
15 years 2 months ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...
FASE
2009
Springer
15 years 2 months ago
Certification of Smart-Card Applications in Common Criteria
This paper describes the certification of smart-card applications in the framework of Common Criteria. In this framework, a smart-card application is represented by a model of its...
Iman Narasamdya, Michaël Périn
« Prev « First page 2894 / 2965 Last » Next »