Sciweavers

867 search results - page 95 / 174
» Secure Input for Web Applications
Sort
View
P2P
2008
IEEE
14 years 3 months ago
Peer-to-Peer Secure Multi-party Numerical Computation
We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collabo...
Danny Bickson, Danny Dolev, Genia Bezman, Benny Pi...
PPPJ
2006
ACM
14 years 3 months ago
Aranea: web framework construction and integration kit
Currently there exist dozens of web controller frameworks that are incompatible, but at the same time have large portions of overlapping functionality that is implemented over and...
Oleg Mürk, Jevgeni Kabanov
ACNS
2009
Springer
123views Cryptology» more  ACNS 2009»
14 years 3 months ago
Practical Secure Evaluation of Semi-private Functions
Abstract. Two-party Secure Function Evaluation (SFE) is a very useful cryptographic tool which allows two parties to evaluate a function known to both parties on their private (sec...
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
UIST
2004
ACM
14 years 2 months ago
Clip, connect, clone: combining application elements to build custom interfaces for information access
Many applications provide a form-like interface for requesting information: the user fills in some fields, submits the form, and the application presents corresponding results. ...
Jun Fujima, Aran Lunzer, Kasper Hornbæk, Yuz...
BIOINFORMATICS
2011
13 years 19 days ago
When the Web meets the cell: using personalized PageRank for analyzing protein interaction networks
Motivation: Enormous, and constantly increasing quantity of biological information is represented in protein interaction network databases. Most of these data are freely accessibl...
Gábor Iván, Vince Grolmusz