Sciweavers

340 search results - page 56 / 68
» A Simple User Authentication Scheme for Grid Computing
Sort
View
SAC
2006
ACM
14 years 1 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
CHI
1994
ACM
13 years 11 months ago
Repeat and predict: two keys to efficient text editing
We propose a simple and powerful predictive interface technique for text editing tasks. With our technique called the dynamic macro creation, when a user types a special "rep...
Toshiyuki Masui, Ken Nakayama
INFOCOM
1994
IEEE
13 years 11 months ago
Optimization of Wireless Resources for Personal Communications Mobility Tracking
In personal communications applications, users communicate via wireless with a wireline network. The wireline network tracks the current location of the user, and can therefore ro...
Upamanyu Madhow, Michael L. Honig, Kenneth Steigli...
PG
2002
IEEE
14 years 19 days ago
A Physics-Based Framework for Subdivision Surface Design with Automatic Rules Control
The recent non-uniform subdivision approach extends traditional uniform subdivision schemes with variable rules, offering additional shape parameters (such as knot spacings) for f...
Hui Xie, Hong Qin
CCS
2010
ACM
14 years 2 months ago
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...