Sciweavers

106 search results - page 21 / 22
» Protect Virtual Property in Online Gaming System
Sort
View
ACSAC
2010
IEEE
13 years 4 months ago
Who is tweeting on Twitter: human, bot, or cyborg?
Twitter is a new web application playing dual roles of online social networking and micro-blogging. Users communicate with each other by publishing text-based posts. The popularit...
Zi Chu, Steven Gianvecchio, Haining Wang, Sushil J...
NAR
2007
91views more  NAR 2007»
13 years 6 months ago
SuperHapten: a comprehensive database for small immunogenic compounds
The immune system protects organisms from foreign proteins, peptide epitopes and a multitude of chemical compounds. Among these, haptens are small molecules, eliciting an immune r...
Stefan Günther, Dorothea Hempel, Mathias Dunk...
ACSAC
2002
IEEE
14 years 13 hour ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
WWW
2009
ACM
14 years 7 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
JUCS
2008
156views more  JUCS 2008»
13 years 7 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng