Filters








46 Hits in 5.7 sec

A Performant, Misuse-Resistant API for Primality Testing

Jake Massimo, Kenneth G. Paterson
2020 Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security  
But developers today are faced with complex APIs for primality testing, along with documentation that fails to clearly state the reliability of the tests being performed.  ...  In an effort to overcome this, we present a primality test having a simplest-possible API: the test accepts a number to be tested and returns a Boolean indicating whether the input was composite or probably  ...  Paterson was supported in part by a gift from. VMware.  ... 
doi:10.1145/3372297.3417264 dblp:conf/ccs/MassimoP20 fatcat:h4tap327inbdvhgn26u7xn2ppu

Applications in Security and Evasions in Machine Learning: A Survey

Ramani Sagar, Rutvij Jhaveri, Carlos Borrego
2020 Electronics  
By analyzing ML algorithms in security application it provides a blueprint for an interdisciplinary research area.  ...  ML extensively supports the demanding requirements of the current scenario of security and privacy across a range of areas such as real-time decision-making, big data processing, reduced cycle time for  ...  Weak attacker embeds a portion of benign code into a malicious app by misusing Manifest.xml file configuration for any malware detection application.  ... 
doi:10.3390/electronics9010097 fatcat:ttmpehdctjhbdk7arxgczl6224

Easing PAIN with Digital Signatures

M. Tariq Banday, Author C.G.Dethe
2011 International Journal of Computer Applications  
Digital signature exists as a file on some storage device or is embedded in hardware devices.  ...  Integrity as a concept means that there is resistance to alteration or substitution of data, and/or that such changes are detected and provable.  ...  Non-repudiation Non-repudiation means the ability to prove that a transaction originated from a particular party. So that party cannot deny that he performed a certain transaction.  ... 
doi:10.5120/3533-4822 fatcat:2qsuizofa5arpm3brn37bzt7rm

Privacy-aware identity management for client-side mashup applications

Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
2009 Proceedings of the 5th ACM workshop on Digital identity management - DIM '09  
We present Web2ID, a new identity management protocol tailored for mashup applications.  ...  Web2ID leverages a secure mashup framework and enables transfer of credentials between a service provider and a consumer.  ...  ACKNOWLEDGEMENTS The first author would like to thank the help of professors at Bahai Institute for Higher Education (BIHE).  ... 
doi:10.1145/1655028.1655036 dblp:conf/dim/ZarandioonYG09 fatcat:wuysrdvdyzgalo32twfpak34fm

Oral presentations

2010 Clinical Microbiology and Infection  
It should also have technical advantages, such as ease of performance, relative low cost, and high throughput. A growing number of molecular methods have been applied to C. difficile.  ...  Recently, a capillary gel electrophoresisbased PCR ribotyping assay has been developed that significantly reduces the hands-on time required for C. difficile PCR ribotyping.  ...  Pairwise analyses were performed using the McNemar test for documentation rate and the Wilcoxon signed-rank test for times for positivity.  ... 
doi:10.1111/j.1469-0691.2010.03238.x pmid:20412063 pmcid:PMC7130035 fatcat:o6vuxo77pvbdhijpoxf72yrio4

Optimization of FCFS Based Resource Provisioning Algorithm for Cloud Computing

Aditya Marphatia Aditya Marphatia
2013 IOSR Journal of Computer Engineering  
We intend to create a module depicting the normal FCFS algorithm in comparison to our optimized version algorithm for resource provisioning in the cloud.  ...  Resource selection is done on the basis of task constraints using a greedy approach. The proposed model will be implemented and tested on simulation toolkit.  ...  Vidisha (M.P) for his great support .  ... 
doi:10.9790/0661-1050105 fatcat:73hohpcqezf3bo6snf6la5qr64

ABSTRACTS AND EXTRACTS OF CURRENT DENTAL LITERATURE FOR 1936

1937 Journal of Periodontology  
Of equal importance is the test of the strength of the capillary wall, the so-called petechien-test which is used for the diagnosis of a latent scurvy.  ...  Misuse of drugs which are prescribed for liver conditions, may harm the teeth. Mor- phinomania may cause a painless extensive caries by decalcification.  ... 
doi:10.1902/jop.1937.8.2.104 fatcat:k7iryko6lrgallckvkspbzoude

Toxicity Analysis and Cry Gene Profiling of Bacillus Thuringiensis Isolated from Western Ghats of Tamil Nadu State, India

A. Ramalakshmi, P. Annakodi, V. Udayasurian, V. Balasubramani
2018 Proceedings of the Indian National Science Academy  
Computing as a discipline is a recent one even though the practice of using mechanical aids for calculation can have various dates based on the perspective of the reader like Blaise Pascal in 1600s, George  ...  Post, and A. A.  ...  For interior-point methods, at each primal dual iteration, we need to solve a large scale system of linear equations.  ... 
doi:10.16943/ptinsa/2018/49413 fatcat:2w6rohpbava5zh6m26tsiz7qky

Improving the security and usability of cloud services with user-centric security models

Saman Zarandioon
2012
Our Web2ID protocol, by leveraging secure client-side cryptography and communication, introduces a privacy-preserving and secure mechanism for user authentication, fine-grained access delegation and identity  ...  We analyze the security of our solutions, demonstrate their usage and effectiveness, and evaluate their performance by extensive experimentation.  ...  The goal of the experiments is to test the performance of OMOS iframe proxy com-Apple Safari v3.1.1.  ... 
doi:10.7282/t3pc31b4 fatcat:ux4n7mvpxveejiyjtnjb2mf3s4

Document Title: A Market Survey on Body Worn Camera Technologies A Market Survey on Body Worn Camera .J of Justice

Vivian Hung, Esq, Steven Babin, Jacqueline Coberly, Vivian Hung, Steven Babin, Jacqueline Coberly
2016 unpublished
assume no liability for any use of publication content. This publication is a reference for educational purposes only.  ...  Handbook for Public Safety Officials: Developing the Policy, Technology and Operational Strategies Needed for a Future-Proof Body Camera Program (Insight, 2015).  ...  Yes 2.g.i.2 Dust intrusion/water resistance Not test tested rating 2.g.i.3 Ruggedized RFI Not yet tested 2.g.i.4 Pressure/depth Not yet tested Q.# RFI Q.# 2.d.ii 2.j.i 2.d.iii 2.j.ii 4.a RFI Q.# 2.a 2  ... 
fatcat:5ip2hocxbvaphbr3jtxesouzk4

Automating Ambiguity: Challenges and Pitfalls of Artificial Intelligence [article]

Abeba Birhane
2022 arXiv   pre-print
framework for approaching challenges, failures and problems surrounding ML systems as well as alternative ways forward.  ...  The various challenges, problems and pitfalls of these systems are a hot topic of research in various areas, such as critical data/algorithm studies, science and technology studies (STS), embodied and  ...  For a small fee, anyone can now use a RISE portal or their API to run an automated procedure and uncover the real-world identities of the individuals in a given image.  ... 
arXiv:2206.04179v1 fatcat:qqln6jaiznctzcshmnsvvv73y4

SECURWARE 2015 Committee SECURWARE Advisory Chairs

Rainer Falk, Hans-Joachim Hof, William Dougherty, Secern Consulting -Charlotte, Hans-Joachim Usa, Hof, Peter Müller, Syed Naqvi, Juha Rőning, Mariusz Jakubowski, Microsoft Research, William Dougherty (+163 others)
unpublished
We are grateful to the members of the SECURWARE 2015 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.  ...  We hope that SECURWARE 2015 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in emerging security information,  ...  ACKNOWLEDGMENT The authors acknowledge the financial support given to this work, under the project "Security Technologies for Mobile Environments -TSAM", granted by the  ... 
fatcat:xebt7atkmzcy5mu3yabwgyczye

Small Data, Linked Data and Open Data

Venkat Gudivada, Dumitru Roman, Maria Pia Di Buono
ALLDATA 2016 The Second International Conference on Big Data   unpublished
ACKNOWLEDGMENT This work was supported by JSPS KAKENHI, Grantin-Aid for Young Scientists (B), and its Grant Number is 15K21423.  ...  It has the potential for groundbreaking scientific discoveries and power for misuse and violation of personal privacy.  ...  Evaluation Methodology The performance is measured by obtaining precision, recall and F-measure values for each test.  ... 
fatcat:m4lk64wx3bculitkh6e6mpdlxm

Secure cloud computing in legal metrology

Alexander Oppermann, Technische Universität Berlin, Technische Universität Berlin, Jean-Pierre Seifert
2020
A secure communication protocol for encrypted data is presented to take account of integrity of encrypted measurements for data in transit.  ...  In this thesis, a Secure Cloud Reference Architecture for measuring instruments is presented, addressing both requirements and roles of the Legal Metrology framework.  ...  Via the Miller-Rabin primality test the property "p = 0 is prime" will be checked.  ... 
doi:10.14279/depositonce-9736 fatcat:ihjx5kwf3ne6xfdsiptmjhcmou

Dead Corals

Paolo Bolaños
2017 Kritike: An Online Journal of Philosophy  
Call this a writerly resistance to parable.  ...  Worse still for a discussion of Arendt's writerly modernism, Arendt explicitly resists self-conscious self-presentation.  ...  perform good actions, i.e., phronesis (wisdom).  ... 
doi:10.25138/11.1.cp fatcat:vy6x36ooorbkbo3dyrqwnvg73i
« Previous Showing results 1 — 15 out of 46 results