Sciweavers

2151 search results - page 349 / 431
» Architecture of the internet archive
Sort
View
ICDCS
2007
IEEE
15 years 7 months ago
Combating Double-Spending Using Cooperative P2P Systems
An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those coins anonymously at participating merchants, so that ...
Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper...
ICDIM
2007
IEEE
15 years 7 months ago
Accessibility and scalability in collaborative eCommerce environments
The Much advancement has lately occurred in eCommerce systems’ interfaces. Product specifications listings combined with pictures is no longer considered the benchmark for eComm...
Michel Khoury, Shervin Shirmohammadi
IEEEARES
2007
IEEE
15 years 7 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
IROS
2007
IEEE
114views Robotics» more  IROS 2007»
15 years 7 months ago
Design and control of a second-generation hyper-redundant mechanism
— We present a refined, second-generation design, construction and integration, of a compact hyper-redundant snakelike robot, called “Woodstock.” This robot has substantial a...
H. Ben Brown, Michael Schwerin, Elie A. Shammas, H...
LCN
2007
IEEE
15 years 7 months ago
Towards Stateless Single-Packet IP Traceback
The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes...
Rafael P. Laufer, Pedro B. Velloso, Daniel de Oliv...