Sciweavers

209 search results - page 20 / 42
» Combining World Wide Web and Wireless Security
Sort
View
AIIA
2001
Springer
15 years 2 months ago
Evaluation Methods for Focused Crawling
The exponential growth of documents available in the World Wide Web makes it increasingly difficult to discover relevant information on a specific topic. In this context, growing ...
Andrea Passerini, Paolo Frasconi, Giovanni Soda
SAC
2010
ACM
15 years 4 months ago
Content cloaking: preserving privacy with Google Docs and other web applications
Web office suites such as Google Docs offer unparalleled collaboration experiences in terms of low software requirements, ease of use, data ubiquity, and availability. When the d...
Gabriele D'Angelo, Fabio Vitali, Stefano Zacchirol...
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
15 years 1 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
89
Voted
WWW
2005
ACM
15 years 10 months ago
Web-assisted annotation, semantic indexing and search of television and radio news
The Rich News system, that can automatically annotate radio and television news with the aid of resources retrieved from the World Wide Web, is described. Automatic speech recogni...
Mike Dowman, Valentin Tablan, Hamish Cunningham, B...
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 8 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau