Sciweavers

905 search results - page 103 / 181
» Public key distribution through
Sort
View

Publication
116views
13 years 9 months ago
Poking Facebook: Characterization of OSN Applications
Facebook is one of the most popular Internet sites today. A key fea- ture that arguably contributed to Facebook's unprecedented success is its application platform, which enab...
Minas Gjoka, Michael Sirivianos, Athina Markopoulo...
SAC
2002
ACM
13 years 8 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
TCS
2010
13 years 7 months ago
Contract-based discovery of Web services modulo simple orchestrators
Web services are distributed processes with a public description of their behavior, or contract. The availability of repositories of Web service descriptions enables interesting f...
Luca Padovani
CORR
2010
Springer
194views Education» more  CORR 2010»
13 years 5 months ago
An Effective Method of Image Retrieval using Image Mining Techniques
The present research scholars are having keen interest in doing their research activities in the area of Data mining all over the world. Especially, [13]Mining Image data is the o...
A. Kannan, V. Mohan, N. Anbazhagan
FC
2003
Springer
101views Cryptology» more  FC 2003»
14 years 2 months ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt