Sciweavers

2024 search results - page 333 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
NETGAMES
2006
ACM
15 years 10 months ago
Meeting technology challenges of pervasive augmented reality games
Pervasive games provide a new type of game combining new technologies with the real environment of the players. While this already poses new challenges to the game developer, requ...
Wolfgang Broll, Jan Ohlenburg, Irma Lindt, Iris He...
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 8 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
174
Voted
ASWEC
2006
IEEE
15 years 10 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
15 years 11 months ago
Supporting Generic Cost Models for Wide-Area Stream Processing
— Existing stream processing systems are optimized for a specific metric, which may limit their applicability to diverse applications and environments. This paper presents XFlow...
Olga Papaemmanouil, Ugur Çetintemel, John J...
AINA
2003
IEEE
15 years 9 months ago
Towards RSVP Lite: Light-Weight RSVP for Generic Signaling
RSVP is a reservation setup protocol designed specifically to support QoS signaling in the Internet. However, RSVP end-to-end signaled QoS for the Internet has not become a reali...
Xiaoming Fu, Cornelia Kappler