Sciweavers

1740 search results - page 85 / 348
» A Digital Archive of Research Papers in Computer Science
Sort
View
CCS
2007
ACM
15 years 5 months ago
An inquiry into the nature and causes of the wealth of internet miscreants
This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online crede...
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan...
AUSFORENSICS
2004
15 years 1 months ago
To Revisit: What is Forensic Computing?
The increase in incidence of criminal, illegal and inappropriate computer behaviour has resulted in organisations forming specialist teams to investigate these behaviours. Academi...
Mathew Hannan
ELPUB
2006
ACM
15 years 5 months ago
Open Access in Sweden 2002-2005
The paper gives an overview of recent developments in Sweden concerning the communication and reception of the Open Access concept and the growth and co-ordination of digital acad...
Jan Hagerlid
IADIS
2004
15 years 1 months ago
A Model of Learning Using the Internet
This paper is a report of some of the findings in a study of how and what women in computer science learn using the Internet for communication with other women. The focus of this ...
Mary Dee Medley
FOCS
2007
IEEE
15 years 6 months ago
Covert Multi-Party Computation
In STOC’05, Ahn, Hopper and Langford introduced the notion of covert computation. A covert computation protocol is one in which parties can run a protocol without knowing if oth...
Nishanth Chandran, Vipul Goyal, Rafail Ostrovsky, ...