Sciweavers

1242 search results - page 5 / 249
» Digital Objects as Passwords
Sort
View
WSC
1998
13 years 8 months ago
An Architectural Design for Digital Objects
We define the term "digital object" and specify a variety of qualities that are important during the object design phase. A digital object contains a set of models, and ...
Paul A. Fishwick
STOC
2010
ACM
193views Algorithms» more  STOC 2010»
13 years 10 months ago
Privacy Amplification with Asymptotically Optimal Entropy Loss
We study the problem of "privacy amplification": key agreement between two parties who both know a weak secret w, such as a password. (Such a setting is ubiquitous on th...
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostr...
ECOOPW
2006
Springer
13 years 10 months ago
Program Analysis for Security and Privacy
Abstract. Software security has become more important than ever. Unfortunately, still now, the security of a software system is almost always retrofitted to an afterthought. When s...
Marco Pistoia, Francesco Logozzo
JMIV
1998
124views more  JMIV 1998»
13 years 6 months ago
Preserving Topology by a Digitization Process
The main task of digital image processing is to recognize properties of real objects based on their digital images. These images are obtained by some sampling device, like a CCD c...
Longin Jan Latecki, Christopher Conrad, Ari D. Gro...
DRM
2006
Springer
13 years 10 months ago
Verifiable digital object identity system
Identification is a two part system comprising of a token or label (an identifier) that can be used to reference an entity and a process that can be used to create label-entity as...
Alapan Arnab, Andrew Hutchison