Sciweavers

1612 search results - page 263 / 323
» About models of security protocols
Sort
View
96
Voted
ACSAC
2010
IEEE
14 years 7 months ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu
ESORICS
2004
Springer
15 years 3 months ago
Comparison Between Two Practical Mix Designs
We evaluate the anonymity provided by two popular email mix implementations, Mixmaster and Reliable, and compare their effectiveness through the use of simulations which model th...
Claudia Díaz, Len Sassaman, Evelyne Dewitte
WWW
2006
ACM
15 years 10 months ago
Temporal rules for mobile web personalization
Many systems use past behavior, preferences and environmental factors to attempt to predict user navigation on the Internet. However we believe that many of these models have shor...
Martin Halvey, Mark T. Keane, Barry Smyth
JCDL
2003
ACM
80views Education» more  JCDL 2003»
15 years 3 months ago
Repository Synchronization in the OAI Framework
The Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) began as an alternative to distributed searching of scholarly eprint repositories. The model embraced by th...
Xiaoming Liu 0005, Kurt Maly, Mohammad Zubair, Mic...
ICPP
2002
IEEE
15 years 2 months ago
EMPOWER: A Scalable Framework for Network Emulation
The development and implementation of new network protocols and applications need accurate, scalable, reconfigurable, and inexpensive tools for debugging, testing, performance tun...
Pei Zheng, Lionel M. Ni