Sciweavers

2207 search results - page 358 / 442
» Security at the Internet Layer
Sort
View
ER
2004
Springer
169views Database» more  ER 2004»
15 years 10 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
INTERNET
2010
119views more  INTERNET 2010»
15 years 3 months ago
A Chat Application in Lift
s the HTTP request–response cycle rather than wrapping HTTP concepts in APIs. This means you put HTML element definition and action in the same place: var name = "" SHt...
David Pollak, Steve Vinoski
102
Voted
ICCV
2007
IEEE
16 years 6 months ago
Soylent Grid: it's Made of People
The ground truth labeling of an image dataset is a task that often requires a large amount of human time and labor. We present an infrastructure for distributed human labeling tha...
Stephan Steinbach, Vincent Rabaud, Serge Belongie
ICWS
2009
IEEE
16 years 1 months ago
Analysis of Signature Wrapping Attacks and Countermeasures
In recent research it turned out that Boolean verification of digital signatures in the context of WSSecurity is likely to fail: If parts of a SOAP message are signed and the sig...
Sebastian Gajek, Meiko Jensen, Lijun Liao, Jö...
107
Voted
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
16 years 1 months ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...