99
Voted
HOST
15 years 19 days ago
2008 IEEE 151
click to vote
ISI
15 years 14 days ago
2008 Springer
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
132
click to vote
CCS
15 years 2 months ago
2008 ACM
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
114
click to vote
SP
15 years 6 months ago
2008 IEEE
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
122
Voted
PST
15 years 1 months ago
2008
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
|