Sciweavers

1317 search results - page 73 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
15 years 10 months ago
Mobilizing Customer Relationship Management - A Journey from Strategy to System Design
The bursting of the e-bubble affected expectations with regard to mobile initiatives and willingness to invest in them very negatively. In both academia and practice, there has re...
Ragnar Schierholz, Lutz Kolbe, Walter Brenner
JPDC
2006
141views more  JPDC 2006»
15 years 4 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
147
Voted
CCS
2009
ACM
15 years 8 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
143
Voted
ESORICS
2008
Springer
15 years 6 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson
ER
1998
Springer
147views Database» more  ER 1998»
15 years 8 months ago
An Active Conceptual Model for Fixed Income Securities Analysis for Multiple Financial Institutions
The practical implementation and use of a mediator for fixed income securities analysis demonstrated the potential for extending the application of conceptual modeling from the sys...
Allen Moulton, Stéphane Bressan, Stuart E. ...