Sciweavers

867 search results - page 114 / 174
» Secure Input for Web Applications
Sort
View
SERP
2003
13 years 10 months ago
Software Requirements Specification of a University Class Scheduler
The University Class Scheduler (UCS) presented in this paper is a novel scheduling tool intended to be used by universities to schedule classes into classrooms. In essence, UCS al...
Deanna M. Needell, Jeff A. Stuart, Tamara C. Thiel...
CHI
2010
ACM
14 years 2 months ago
Vote-o-graph: a dishonest touchscreen voting system
We present Vote-O-Graph, an experimental touchscreen voting system designed to simulate reported interface issues in existing electronic voting systems. Touchscreen miscalibration...
Andrea L. Mascher, Paul T. Cotton, Douglas W. Jone...
ISI
2007
Springer
14 years 3 months ago
An LDA-based Community Structure Discovery Approach for Large-Scale Social Networks
Abstract— Community discovery has drawn significant research interests among researchers from many disciplines for its increasing application in multiple, disparate areas, inclu...
Haizheng Zhang, Baojun Qiu, C. Lee Giles, Henry C....
CHES
2007
Springer
94views Cryptology» more  CHES 2007»
14 years 3 months ago
MAME: A Compression Function with Reduced Hardware Requirements
This paper describes a new compression function, MAME designed for hardware-oriented hash functions which can be used in applications reduced hardware requirements. MAME takes a 25...
Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, J...
ICISS
2010
Springer
13 years 6 months ago
Unifying Facets of Information Integrity
Abstract. Information integrity is a vital security property in a variety of applications. However, there is more than one facet to integrity: interpretations of integrity in diffe...
Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld