Sciweavers

1625 search results - page 146 / 325
» Privacy-preserving data publishing
Sort
View
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 11 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
ICSOC
2003
Springer
15 years 9 months ago
Semantic Structure Matching for Assessing Web-Service Similarity
The web-services stack of standards is designed to support the reuse and interoperation of software components on the web. A critical step in the process of developing applications...
Yiqiao Wang, Eleni Stroulia
EP
1998
Springer
15 years 8 months ago
Memory Scalability in Constraint-Based Multimedia Style Sheet Systems
Abstract. Multimedia style sheet systems uniformly use a constraintbased model of layout. Constraints provide a uniform mechanism for all aspects of style management and layout and...
Terry Cumaranatunge, Ethan V. Munson
IUI
1997
ACM
15 years 8 months ago
Generating Web-Based Presentations in Spatial Hypertext
Presentations frequently include material appropriated from external sources; they may incorporate tabular data from published reports, photographs from books, or clip art from pu...
Frank M. Shipman III, Richard Furuta, Catherine C....
APWEB
2003
Springer
15 years 8 months ago
Mining "Hidden Phrase" Definitions from the Web
Keyword searching is the most common form of document search on the Web. Many Web publishers manually annotate the META tags and titles of their pages with frequently queried phras...
Hung V. Nguyen, P. Velamuru, Deepak Kolippakkam, H...