Sciweavers

511 search results - page 64 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 7 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
134
Voted
WISEC
2009
ACM
15 years 10 months ago
Towards a theory for securing time synchronization in wireless sensor networks
Time synchronization in highly distributed wireless systems like sensor and ad hoc networks is extremely important in order to maintain a consistent notion of time throughout the ...
Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, ...
SASN
2005
ACM
15 years 9 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
HT
2010
ACM
15 years 9 months ago
The impact of resource title on tags in collaborative tagging systems
Collaborative tagging systems are popular tools for organization, sharing and retrieval of web resources. Their success is due to their freedom and simplicity of use. To post a re...
Marek Lipczak, Evangelos E. Milios
HLK
2003
IEEE
15 years 9 months ago
Regularized 3D Morphable Models
Three-dimensional morphable models of object classes are a powerful tool in modeling, animation and recognition. We introduce here the new concept of regularized 3D morphable mode...
Curzio Basso, Thomas Vetter, Volker Blanz