Sciweavers

867 search results - page 96 / 174
» Secure Input for Web Applications
Sort
View
CCS
2010
ACM
13 years 9 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
TRUST
2010
Springer
13 years 7 months ago
The PUF Promise
Physical Uncloneable Functions (PUF) are systems whose physical behavior to different inputs can be measured reliably, yet cannot be cloned in a physical replica. Existing designs ...
Heike Busch, Miroslava Sotáková, Ste...
WWW
2001
ACM
14 years 9 months ago
XML Key Management Specification (XKMS)
The XML Key Management Specification (XKMS) is described. XKMS is a Web Service that provides an interface between an XML application and a Public Key Infrastructure (PKI). XKMS g...
Phillip M. Hallam-Baker, Warwick Ford
MUE
2007
IEEE
149views Multimedia» more  MUE 2007»
14 years 3 months ago
SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission
Securing multimedia transmission has become a challenging issue due to the popularization of real-time multimedia applications such as video surveillance, satellite communication ...
Euijin Choo, Jehyun Lee, Heejo Lee, Giwon Nam
GIR
2006
ACM
14 years 3 months ago
Detecting Geographical Serving Area of Web Resources
Most human activities occur around where the user is physically located. Knowing the geographical serving area of web resources, therefore, is very important for many web applicat...
Qi Zhang, Xing Xie, Lee Wang, Lihua Yue, Wei-Ying ...