Sciweavers

1005 search results - page 11 / 201
» Practical Secure Function Evaluation
Sort
View
EUROCRYPT
1999
Springer
13 years 11 months ago
Software Performance of Universal Hash Functions
Abstract. This paper compares the parameters sizes and software performance of several recent constructions for universal hash functions: bucket hashing, polynomial hashing, Toepli...
Wim Nevelsteen, Bart Preneel
AWIC
2003
Springer
14 years 23 days ago
Secure Intelligent Agents Based on Formal Description Techniques
This paper describes a practical solution for the incorporation of security services in agents. From a set of basic user requirements, the agents will be able to find out the best ...
L. Mengual, C. de la Puente
JCDL
2005
ACM
111views Education» more  JCDL 2005»
14 years 1 months ago
Developing practical automatic metadata assignment and evaluation tools for internet resources
This paper describes the development of practical automatic metadata assignment tools to support automatic record creation for virtual libraries, metadata repositories and digital...
Gordon W. Paynter
EUROPLOP
2006
13 years 9 months ago
Securing the Broker Pattern
We consider how to add security to the Broker distribution pattern. We do so by examining how systems using Broker are secured in practice, and by then revising the pattern to ref...
Patrick Morrison, Eduardo B. Fernandez
VVS
2000
IEEE
130views Visualization» more  VVS 2000»
13 years 12 months ago
A practical evaluation of popular volume rendering algorithms
This paper evaluates and compares four volume rendering algorithms that have become rather popular for rendering datasets described on uniform rectilinear grids: raycasting, splat...
Michael Meißner, Jian Huang, Dirk Bartz, Kla...