Sciweavers

53 search results - page 5 / 11
» Generating a privacy footprint on the internet
Sort
View
77
Voted
SIGCSE
2005
ACM
124views Education» more  SIGCSE 2005»
15 years 3 months ago
The virtual network system
The goal of our work is to give students a hands-on experience designing, deploying and debugging parts of the Internet infrastructure, such as an Internet router that routes real...
Martin Casado, Nick McKeown
WWW
2004
ACM
15 years 10 months ago
Filtering spam e-mail on a global scale
In this paper we analyze a very large junk e-mail corpus which was generated by a hundred thousand volunteer users of the Hotmail e-mail service. We describe how the corpus is bei...
Geoff Hulten, Joshua T. Goodman, Robert Rounthwait...
SOUPS
2009
ACM
15 years 4 months ago
Graphical passwords as browser extension: implementation and usability study
Abstract: Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based ...
Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Haka...
94
Voted
AGENTS
2001
Springer
15 years 2 months ago
A shopper's assistant
Shopping on the Internet has become a convenient way of purchasing commodities of choice. A key contribution of agent technology will be to develop personal agents that can assist...
Partha Sarathi Dutta, Sandip Debnath, Sandip Sen
ACSAC
2007
IEEE
15 years 3 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...