Sciweavers

1943 search results - page 274 / 389
» Web application security engineering
Sort
View
IVC
2008
93views more  IVC 2008»
15 years 3 months ago
A blind source separation-based method for multiple images encryption
Blind source separation (BSS) has been successfully applied to many fields such as communications and biomedical engineering. Its application for image encryption, however, remain...
Qiu-Hua Lin, Fuliang Yin, Tiemin Mei, Hualou Liang
INFORMATICALT
2006
134views more  INFORMATICALT 2006»
15 years 3 months ago
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem
We know the necessity for information security becomes more widespread in these days, especially for hardware-based implementations such as smart cards chips for wireless applicati...
Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Je...
EUROSYS
2006
ACM
16 years 24 days ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
SOUPS
2006
ACM
15 years 9 months ago
Power strips, prophylactics, and privacy, oh my!
While Internet users claim to be concerned about online privacy, their behavior rarely reflects those concerns. In this paper we investigate whether the availability of compariso...
Julia Gideon, Lorrie Faith Cranor, Serge Egelman, ...
SCW
2006
IEEE
15 years 9 months ago
Towards Unified QoS/SLA Ontologies
This paper reports on work in progress to produce a unified Quality of Service (QoS) ontology This ontology must be applicable to the main scenarios currently identified such as Q...
Glen Dobson, Alfonso Sánchez-Macián