Sciweavers

6137 search results - page 118 / 1228
» Securing Collaborative Applications
Sort
View
119
Voted
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 3 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003
82
Voted
ISI
2005
Springer
15 years 7 months ago
Template Based Semantic Similarity for Security Applications
Boanerges Aleman-Meza, Christian Halaschek-Wiener,...
187
Voted
WS
2003
ACM
15 years 7 months ago
Wireless LAN location-sensing for security applications
This paper considers the problem of using wireless LAN locationsensing for security applications. Recently, Bayesian methods have been successfully used to determine location from...
Ping Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wall...
100
Voted
IPSN
2010
Springer
15 years 8 months ago
A vehicular surveillance and sensing system for car security and tracking applications
In this paper, we propose a Vehicular Surveillance and Sensing System (VS3 ), which targets at car security and tracking applications. VS3 can be triggered by events detected insi...
Lien-Wu Chen, Kun-Ze Syue, Yu-Chee Tseng
CN
2007
141views more  CN 2007»
15 years 2 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...