Sciweavers

2139 search results - page 184 / 428
» Distributed computing and computer security education
Sort
View
134
Voted
WORM
2004
15 years 4 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
JAMIA
2011
68views more  JAMIA 2011»
14 years 6 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
111
Voted
SIGCSE
2009
ACM
94views Education» more  SIGCSE 2009»
16 years 3 months ago
CS1 students speak: advice for students by students
We collected advice on how to succeed at learning to program from 164 CS1 students at 3 institutions during a "saying is believing"intervention designed to encourage a g...
Beth Simon, Brian Hanks, Carol Zander, Laurie Murp...
ICPPW
2003
IEEE
15 years 8 months ago
Perfect Secrecy in Wireless Networks
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The ...
Phillip G. Bradford, Olga V. Gavrylyako, Randy K. ...
FOCS
2007
IEEE
15 years 9 months ago
Cryptography from Sunspots: How to Use an Imperfect Reference String
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
Ran Canetti, Rafael Pass, Abhi Shelat