Sciweavers

2355 search results - page 321 / 471
» Anonymizing Temporal Data
Sort
View
109
Voted
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
15 years 7 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
121
Voted
FINTAL
2006
15 years 5 months ago
Coordination Structures in a Typed Feature Structure Grammar: Formalization and Implementation
Abstract. Every language employs its own coordination strategies, according to the type of coordinating marking, the pattern of marking, the position of the marker, and the phrase ...
Jong-Bok Kim, Jaehyung Yang
ASSETS
2008
ACM
15 years 3 months ago
Software and technologies designed for people with autism: what do users want?
Software developers, designers and researchers have been looking to technology for solutions to help and educate people with autism for over two decades. There are many examples o...
Cynthia Putnam, Lorna Chong
CEAS
2008
Springer
15 years 3 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
USENIX
1993
15 years 3 months ago
AudioFile: A Network-Transparent System for Distributed Audio Applications
AudioFile is a portable, device-independent, network-transparent system for computer audio systems. to the X Window System, it provides an abstract audio device interface with a s...
Jim Gettys, Thoms M. Levergood, Andrew C. Payne, L...