Sciweavers

352 search results - page 47 / 71
» Information Disclosure as a Means to Security
Sort
View
AC
2000
Springer
15 years 11 days ago
State of the art in electronic payment systems
nvented abstract representations of value. As time passed, representations of value became more abstract, progressing from barter through bank notes, payment orders, checks, credit...
N. Asokan, Philippe A. Janson, Michael Steiner, Mi...
108
Voted
PLDI
2009
ACM
15 years 7 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
102
Voted
WIKIS
2009
ACM
15 years 7 months ago
Wiki credibility enhancement
Wikipedia has been very successful as an open encyclopedia which is editable by anybody. However, the anonymous nature of Wikipedia means that readers may have less trust since th...
Felix Halim, Yongzheng Wu, Roland H. C. Yap
81
Voted
ICDIM
2007
IEEE
15 years 6 months ago
A complexity-based method for anti-spamming
A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...
IDT
2008
123views more  IDT 2008»
15 years 18 days ago
A rich semantic model of track as a foundation for sharing beliefs regarding dynamic objects and events
: Many defense, homeland security, and commercial security objectives require continuous tracking of mobile entities such as aircraft. The systems that perform these functions prod...
Frederick Hayes-Roth, Curtis L. Blais