Sciweavers

6164 search results - page 847 / 1233
» Teaching Computer Security
Sort
View
DAC
1998
ACM
16 years 6 months ago
WELD - An Environment for Web-based Electronic Design
Increasing size and geographical separation of design data and teams has created a need for a network-based electronic design environment that is scaleable, adaptable, secure, hig...
Francis L. Chan, Mark D. Spiller, A. Richard Newto...
TCC
2010
Springer
166views Cryptology» more  TCC 2010»
16 years 2 months ago
Public-Key Encryption Schemes with Auxiliary Inputs
We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one t...
Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kala...
FGCN
2008
IEEE
200views Communications» more  FGCN 2008»
15 years 11 months ago
Fast Method for Multiple Human Face Segmentation in Color Image
Face segmentation has been used in many different applications, such as face tracking, video surveillance in security control system and human computer interface. In this paper we...
Rudy Adipranata, Eddy, Cherry G. Ballangan, Ronald...
ICSOC
2007
Springer
15 years 11 months ago
Byzantine Fault Tolerant Coordination for Web Services Atomic Transactions
Abstract. In this paper, we present the mechanisms needed for Byzantine fault tolerant coordination of Web services atomic transactions. The mechanisms have been incorporated into ...
Wenbing Zhao
OOPSLA
2007
Springer
15 years 11 months ago
Towards a framework for requirement change management in healthcare software applications
Requirements volatility is an issue in software development life cycle which often originated from our incomplete knowledge about the domain of interest. In this paper, we propose...
Arash Shaban-Nejad, Volker Haarslev