Sciweavers

1825 search results - page 173 / 365
» Cryptographic Securities Exchanges
Sort
View
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
14 years 7 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
112
Voted
ISI
2004
Springer
15 years 9 months ago
Identifying Multi-ID Users in Open Forums
We describe a model for real-time communication exchange in public forums, such as newsgroups and chatrooms, and use this model to develop an efficient algorithm which identifies...
Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Is...
SAINT
2008
IEEE
15 years 10 months ago
ROOK: Multi-session Based Network Security Event Detector
We have implemented Multi-Session based Network Security Event Detector: ROOK to detect botnet activity and P2P file sharing traffic and our results show that our method is less...
Masayoshi Mizutani, Shin Shirahata, Masaki Minami,...
ISCIS
2005
Springer
15 years 9 months ago
A Secure Communication Framework for Mobile Agents
Abstract. Communication, a fundamental concept in computing, allows two pieces of software to interact and to exchange information. It is an important aspect of mobile agent system...
Suat Ugurlu, Nadia Erdogan
ITCC
2003
IEEE
15 years 9 months ago
A Federated Model for Secure Web-Based Videoconferencing
This paper describes efforts underway within Internet2 to create a secure federated IP based videoconferencing model. The objective is to create an environment that is user-friend...
Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, ...