Sciweavers

464 search results - page 54 / 93
» Privacy Engineering for Digital Rights Management Systems
Sort
View
104
Voted
HOTOS
2003
IEEE
15 years 5 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh
CCS
2007
ACM
15 years 6 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
92
Voted
CCS
2009
ACM
15 years 7 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
94
Voted
ITSSA
2006
129views more  ITSSA 2006»
15 years 13 days ago
A MultiAgent System for Classifying Bioinformatics Publications
Abstract. A growing amounts of information are currently being generated and stored in the World Wide Web (WWW), in particular, researchers in any field can find a lot of publicati...
Eloisa Vargiu, Andrea Addis
OOPSLA
2005
Springer
15 years 6 months ago
Estimating software based on use case points
It is well documented that software product cost estimates are notoriously inaccurate across the software industry. Creating accurate cost estimates for software product developme...
Edward R. Carroll