Sciweavers

164 search results - page 9 / 33
» A Case (Study) For Usability in Secure Email Communication
Sort
View
WOSP
2004
ACM
15 years 2 months ago
Experimenting different software architectures performance techniques: a case study
In this paper we describe our experience in performance analysis of the software architecture of the NICE case study which is responsible for providing several secure communicatio...
Simonetta Balsamo, Moreno Marzolla, Antinisca Di M...
IPPS
2003
IEEE
15 years 2 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
ECSCW
2003
14 years 10 months ago
Applying Cyber-Archaeology
Online spaces that enable public shared inter-personal communications are of significant social and economic importance. This paper outlines a theoretical model and methodology, la...
Quentin Jones
ICDE
2008
IEEE
122views Database» more  ICDE 2008»
15 years 10 months ago
On Signatures for Communication Graphs
Abstract-- Communications between individuals can be represented by (weighted, multi-) graphs. Many applications operate on communication graphs associated with telephone calls, em...
Graham Cormode, Flip Korn, S. Muthukrishnan, Yihua...
89
Voted
ISI
2003
Springer
15 years 2 months ago
COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement
Abstract. In this paper, we report our work on developing and evaluating a prototype system aimed at addressing the information monitoring and sharing challenges in the law enforce...
Daniel Dajun Zeng, Hsinchun Chen, Damien Daspit, F...