Sciweavers

5722 search results - page 165 / 1145
» Security Function Interactions
Sort
View
120
Voted
APGV
2008
ACM
164views Visualization» more  APGV 2008»
15 years 2 months ago
Quantifying usability in secure graphics: assessing the user costs of protecting 3D content
There is an increasing need for methods for secure dissemination of interactive 3D graphics content, providing protection for valuable 3D models while still allowing them to be wi...
Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Tho...
106
Voted
CSCWD
2008
Springer
15 years 2 months ago
XML and web services security
With an increasing amount of semi-structured data XML has become important. XML documents may contain private information that cannot be shared by all user communities. Therefore,...
Lili Sun, Yan Li
91
Voted
CRYPTO
2009
Springer
131views Cryptology» more  CRYPTO 2009»
15 years 7 months ago
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
The well-studied task of learning a linear function with errors is a seemingly hard problem and the basis for several cryptographic schemes. Here we demonstrate additional applicat...
Benny Applebaum, David Cash, Chris Peikert, Amit S...
89
Voted
CHI
2009
ACM
15 years 7 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
88
Voted
IPSN
2010
Springer
15 years 7 months ago
A vehicular surveillance and sensing system for car security and tracking applications
In this paper, we propose a Vehicular Surveillance and Sensing System (VS3 ), which targets at car security and tracking applications. VS3 can be triggered by events detected insi...
Lien-Wu Chen, Kun-Ze Syue, Yu-Chee Tseng