Sciweavers

1040 search results - page 7 / 208
» Privacy for Telecom Services
Sort
View
108
Voted
CCS
1993
ACM
15 years 6 months ago
Denial of Service
Roger M. Needham
71
Voted
ESORICS
1994
Springer
15 years 6 months ago
Authentication via Multi-Service Tickets in the Kuperee Server
Thomas Hardjono, Jennifer Seberry
93
Voted
ESORICS
2007
Springer
15 years 5 months ago
Trustworthy Services and the Biological Analogy
Michael K. Reiter
145
Voted
GLOBECOM
2008
IEEE
15 years 2 months ago
Peer-to-Peer Traffic: From Measurements to Analysis
We report in this paper measurements from France Telecom commercial networks carrying traffic generated and received by ADSL and FTTH customers. By adopting a flowbased approach to...
Fabrice Guillemin, Catherine Rosenberg, Long Le, G...
JDWM
2007
84views more  JDWM 2007»
15 years 1 months ago
A Look back at the PAKDD Data Mining Competition 2006
The PAKDD Competition 2006 involved the problem of classifying mobile telecom network customers into 2G and 3G, with the ultimate aim of identifying existing 2G network customers w...
Nathaniel B. Noriel, Chew Lim Tan