Sciweavers

1373 search results - page 54 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
CCS
2009
ACM
14 years 3 months ago
Ripley: automatically securing web 2.0 applications through replicated execution
Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many...
K. Vikram, Abhishek Prateek, V. Benjamin Livshits
SAC
2009
ACM
14 years 3 months ago
On the practical importance of communication complexity for secure multi-party computation protocols
Many advancements in the area of Secure Multi-Party Computation (SMC) protocols use improvements in communication complexity as a justification. We conducted an experimental stud...
Florian Kerschbaum, Daniel Dahlmeier, Axel Schr&ou...
PERCOM
2006
ACM
14 years 8 months ago
Reducing Configuration Overhead with Goal-oriented Programming
The rapid increase in the number and variety of consumer-level electronic devices without the corresponding development of device management technology has lead to a configuration ...
Justin Mazzola Paluska, Hubert Pham, Umar Saif, Ch...
LADC
2007
Springer
14 years 2 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
PERVASIVE
2010
Springer
13 years 10 months ago
Studying the Use and Utility of an Indoor Location Tracking System for Non-experts
Abstract. Indoor location tracking systems have been a major focus of ubiquitous computing research, and they have much promise to help in collecting objective, real time data for ...
Shwetak N. Patel, Julie A. Kientz, Sidhant Gupta