113
Voted
HOST
15 years 2 months ago
2008 IEEE 178
click to vote
ISI
15 years 2 months ago
2008 Springer
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
153
Voted
CCS
15 years 4 months ago
2008 ACM
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
134
Voted
SP
15 years 9 months ago
2008 IEEE
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
141
Voted
PST
15 years 4 months ago
2008
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
|