Sciweavers

731 search results - page 146 / 147
» New Security Results on Encrypted Key Exchange
Sort
View
DIMVA
2011
12 years 9 months ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...
DASFAA
2007
IEEE
160views Database» more  DASFAA 2007»
14 years 3 days ago
Implementation of Bitmap Based Incognito and Performance Evaluation
In the era of the Internet, more and more privacy-sensitive data is published online. Even though this kind of data are published with sensitive attributes such as name and social ...
Hyun-Ho Kang, Jae-Myung Kim, Gap-Joo Na, Sang-Won ...
ISCC
2006
IEEE
13 years 11 months ago
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing
— The stability and robustness of BGP remains one of the most critical elements in sustaining today’s Internet. In this paper, we study the structure and stability of origin ad...
Sophie Y. Qiu, Patrick Drew McDaniel, Fabian Monro...
FC
2005
Springer
143views Cryptology» more  FC 2005»
13 years 11 months ago
Risk Assurance for Hedge Funds Using Zero Knowledge Proofs
Abstract. This work introduces a new tool for a fund manager to verifiably communicate portfolio risk characteristics to an investor. We address the classic dilemma: How can an in...
Michael Szydlo
TASE
2008
IEEE
13 years 5 months ago
Group Elevator Scheduling With Advance Information for Normal and Emergency Modes
Group elevator scheduling has long been recognized as an important problem for building transportation efficiency, since unsatisfactory elevator service is one of the major complai...
Peter B. Luh, Bo Xiong, Shi-Chung Chang