Sciweavers

471 search results - page 44 / 95
» Social applications: exploring a more secure framework
Sort
View
WWW
2005
ACM
14 years 8 months ago
Disambiguating Web appearances of people in a social network
Say you are looking for information about a particular person. A search engine returns many pages for that person's name but which pages are about the person you care about, ...
Ron Bekkerman, Andrew McCallum
SIES
2008
IEEE
14 years 2 months ago
Scalably distributed SystemC simulation for embedded applications
SystemC becomes popular as an efficient system-level modelling language and simulation platform. However, the solethread simulation kernel obstacles its performance progress from ...
Kai Huang, Iuliana Bacivarov, Fabian Hugelshofer, ...
CCS
2008
ACM
13 years 9 months ago
VEP: a virtual machine for extended proof-carrying code
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating the proofs which are inherently larg...
Heidar Pirzadeh, Danny Dubé
GLOBECOM
2010
IEEE
13 years 5 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
SACRYPT
2005
Springer
138views Cryptology» more  SACRYPT 2005»
14 years 1 months ago
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attac...
An Braeken, Joseph Lano