Sciweavers

5255 search results - page 383 / 1051
» Formal Methods for Privacy
Sort
View
189
Voted
ECRIME
2007
15 years 9 months ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
128
Voted
FOSAD
2009
Springer
15 years 9 months ago
Verification of Concurrent Programs with Chalice
A program verifier is a tool that allows developers to prove that their code satisfies its specification for every possible input and every thread schedule. These lecture notes des...
K. Rustan M. Leino, Peter Müller, Jan Smans
ACISP
2006
Springer
15 years 8 months ago
Efficient Identity-Based Signatures Secure in the Standard Model
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...
Kenneth G. Paterson, Jacob C. N. Schuldt
ACSAC
2004
IEEE
15 years 8 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
ACSAC
2004
IEEE
15 years 8 months ago
Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type
One of the growing problems faced by network administrators is the abuse of computing resources by authorized and unauthorized personnel. The nature of abuse may vary from using u...
Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. ...