Sciweavers

357 search results - page 62 / 72
» Performance Comparison of Security Mechanisms for Grid Servi...
Sort
View
ASIASIM
2004
Springer
15 years 6 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
ACSAC
2010
IEEE
14 years 11 months ago
Spam mitigation using spatio-temporal reputations from blacklist history
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to...
Andrew G. West, Adam J. Aviv, Jian Chang, Insup Le...
ITCC
2005
IEEE
15 years 7 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
COMCOM
2010
129views more  COMCOM 2010»
15 years 1 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
SOCIALCOM
2010
14 years 11 months ago
Learning to Predict Ad Clicks Based on Boosted Collaborative Filtering
This paper addresses the topic of social advertising, which refers to the allocation of ads based on individual user social information and behaviors. As social network services (e...
Teng-Kai Fan, Chia-Hui Chang