Sciweavers

392 search results - page 37 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
ACMSE
2005
ACM
14 years 4 months ago
Token-based dynamic trust establishment for web services
Despite recent advances in trust relationship control mechanisms, issues remain that impede the development of effective trust models. One of these is the lack of dynamic mechanis...
Zhengping Wu, Alfred C. Weaver
VISUALIZATION
2002
IEEE
14 years 3 months ago
Efficient Simplification of Point-Sampled Surfaces
In this paper we introduce, analyze and quantitatively compare a number of surface simplification methods for point-sampled geometry. We have implemented incremental and hierarchi...
Mark Pauly, Markus H. Gross, Leif Kobbelt
CVPR
2006
IEEE
15 years 23 days ago
Multiview Geometry for Texture Mapping 2D Images Onto 3D Range Data
The photorealistic modeling of large-scale scenes, such as urban structures, requires a fusion of range sensing technology and traditional digital photography. This paper presents...
Lingyun Liu, Gene Yu, George Wolberg, Siavash Zoka...
CCS
2001
ACM
14 years 3 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
ESORICS
2010
Springer
13 years 12 months ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers