Sciweavers

1398 search results - page 276 / 280
» Ensuring Properties of Interaction Systems
Sort
View
TCC
2007
Springer
170views Cryptology» more  TCC 2007»
14 years 1 months ago
Secure Linear Algebra Using Linearly Recurrent Sequences
In this work we present secure two-party protocols for various core problems in linear algebra. Our main result is a protocol to obliviously decide singularity of an encrypted matr...
Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew...
SKG
2006
IEEE
14 years 1 months ago
Security Attack Ontology for Web Services
Web services (WS) have become a significant part of the Web because of such attractive features as simple to use, platform independence, and XML/SOAP support. However, these featu...
Artem Vorobiev, Jun Han
GRAPHITE
2005
ACM
14 years 29 days ago
3D screen-space widgets for non-linear projection
Linear perspective is a good approximation to the format in which the human visual system conveys 3D scene information to the brain. Artists expressing 3D scenes, however, create ...
Patrick Coleman, Karan Singh, Leon Barrett, Nisha ...
HT
2005
ACM
14 years 29 days ago
From the writable web to global editability
The technical and competence requirements for writing content on the web is still one of the major factors that widens the gap between authors and readers. Although tools that sup...
Angelo Di Iorio, Fabio Vitali
VIZSEC
2005
Springer
14 years 26 days ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...