Sciweavers

53 search results - page 5 / 11
» Generating a privacy footprint on the internet
Sort
View
SIGCSE
2005
ACM
124views Education» more  SIGCSE 2005»
15 years 6 months ago
The virtual network system
The goal of our work is to give students a hands-on experience designing, deploying and debugging parts of the Internet infrastructure, such as an Internet router that routes real...
Martin Casado, Nick McKeown
WWW
2004
ACM
16 years 2 months ago
Filtering spam e-mail on a global scale
In this paper we analyze a very large junk e-mail corpus which was generated by a hundred thousand volunteer users of the Hotmail e-mail service. We describe how the corpus is bei...
Geoff Hulten, Joshua T. Goodman, Robert Rounthwait...
SOUPS
2009
ACM
15 years 7 months ago
Graphical passwords as browser extension: implementation and usability study
Abstract: Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based ...
Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Haka...
AGENTS
2001
Springer
15 years 5 months ago
A shopper's assistant
Shopping on the Internet has become a convenient way of purchasing commodities of choice. A key contribution of agent technology will be to develop personal agents that can assist...
Partha Sarathi Dutta, Sandip Debnath, Sandip Sen
ACSAC
2007
IEEE
15 years 7 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...