Sciweavers

6137 search results - page 1004 / 1228
» Securing Collaborative Applications
Sort
View
USENIX
2003
15 years 3 months ago
A Multi-User Virtual Machine
Recent efforts aimed at improving the scalability of the JavaTM platform have focused primarily on the safe collocation of multiple applications in the virtual machine. This is of...
Grzegorz Czajkowski, Laurent Daynès, Ben Ti...
VCIP
2003
153views Communications» more  VCIP 2003»
15 years 3 months ago
Flexible authentication of images
In this paper, we propose a novel authentication method for digital images that achieves fine authenticating granularity (e.g., block-level granularity). Its appealing flexibility ...
Yanjiang Yang, Feng Bao, Robert H. Deng
CORR
2010
Springer
83views Education» more  CORR 2010»
15 years 2 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
94
Voted
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 2 months ago
A Computational Framework for the Near Elimination of Spreadsheet Risk
We present Risk Integrated's Enterprise Spreadsheet Platform (ESP), a technical approach to the near-elimination of spreadsheet risk in the enterprise computing environment, ...
Yusuf Jafry, Fredrika Sidoroff, Roger Chi
CORR
2008
Springer
148views Education» more  CORR 2008»
15 years 2 months ago
Conversion/Preference Games
We introduce the concept of Conversion/Preference Games, or CP games for short. CP games generalize the standard notion of strategic games. First we exemplify the use of CP games. ...
Stéphane Le Roux, Pierre Lescanne, Ren&eacu...
« Prev « First page 1004 / 1228 Last » Next »