Sciweavers

2904 search results - page 79 / 581
» Internet Infrastructure Security
Sort
View
PET
2010
Springer
15 years 5 months ago
On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot
Web Search is one of the most rapidly growing applications on the internet today. However, the current practice followed by most search engines – of logging and analyzing usersâ€...
Sai Teja Peddinti, Nitesh Saxena
SIS
2004
15 years 2 months ago
Semantic Interoperability of Authorizations
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this s...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
ESORICS
2010
Springer
15 years 2 months ago
On E-Vote Integrity in the Case of Malicious Voter Computers
Norway has started to implement e-voting (over the Internet, and by using voters' own computers) within the next few years. The vulnerability of voter's computers was ide...
Sven Heiberg, Helger Lipmaa, Filip van Laenen
INTERNET
2010
153views more  INTERNET 2010»
14 years 12 months ago
Composition as a Service
— Software as a Service (SaaS) and the possibility to compose Web services provisioned over the Internet are important assets for a service-oriented architecture (SOA). However, ...
M. Brian Blake, Wei Tan, Florian Rosenberg
HICSS
2006
IEEE
140views Biometrics» more  HICSS 2006»
15 years 7 months ago
Programming Education in the Era of the Internet: A Paradigm Shift
Over the last several years, the Computer Science (CS) community has put a great deal of effort in to the area of security research, and have made great advances. Counterintuitive...
Scott Harrison, Nadine Hanebutte, Jim Alves-Foss