Sciweavers

10156 search results - page 1993 / 2032
» Step by Step to Histories
Sort
View
USS
2010
14 years 9 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
USS
2010
14 years 9 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
ANCS
2009
ACM
14 years 9 months ago
Range Tries for scalable address lookup
In this paper we introduce the Range Trie, a new multiway tree data structure for address lookup. Each Range Trie node maps to an address range [Na, Nb) and performs multiple comp...
Ioannis Sourdis, Georgios Stefanakis, Ruben de Sme...
BIOSIG
2009
127views Biometrics» more  BIOSIG 2009»
14 years 9 months ago
Supplemental Biometric User Authentication for Digital-Signature Smart Cards
: This paper specifies how biometric verification methods can be applied in addition to PIN verification on digital-signature smart cards in compliance with established smart-card ...
Olaf Henniger, Ulrich Waldmann
CAIP
2009
Springer
202views Image Analysis» more  CAIP 2009»
14 years 9 months ago
Near-Regular Texture Synthesis
This paper describes a method for seamless enlargement or editing of difficult colour textures containing simultaneously both regular periodic and stochastic components. Such textu...
Michal Haindl, Martin Hatka
« Prev « First page 1993 / 2032 Last » Next »