Sciweavers

141 search results - page 2 / 29
» Encrypting the internet
Sort
View
WWW
2005
ACM
14 years 6 months ago
Enhancing the privacy of web-based communication
A profiling adversary is an adversary whose goal is to classify a population of users into categories according to messages they exchange. This adversary models the most common pr...
Aleksandra Korolova, Ayman Farahat, Philippe Golle
ICEIS
1999
IEEE
13 years 9 months ago
A New Method to Block Access to Illegal and Harmful Content on the Internet
: Filtering software is the most commonly used to protect children and young people from illegal and harmful contents on the Internet. Most of this software blocks access to Intern...
Byung-Jeon Yoo, Hyun-Gyoo Yook, Myong-Soon Park
COMCOM
2004
83views more  COMCOM 2004»
13 years 5 months ago
Breaking network security based on synchronized chaos
Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possi...
Gonzalo Álvarez, Shujun Li
ACSW
2003
13 years 6 months ago
A Secure Mental Poker Protocol Over The Internet
An efficient and secure mental poker scheme is proposed in this paper. It is based on multiple encryption and decryption of individual cards. The protocol satisfies all major sec...
Weiliang Zhao, Vijay Varadharajan, Yi Mu
CCS
2005
ACM
13 years 11 months ago
Tracking anonymous peer-to-peer VoIP calls on the internet
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low lat...
Xinyuan Wang, Shiping Chen, Sushil Jajodia