Sciweavers

1599 search results - page 99 / 320
» Program Analysis for Security and Privacy
Sort
View
TRUST
2010
Springer
15 years 2 months ago
The Role of Soft Information in Trust Building: Evidence from Online Social Lending
We analyze empirical data of Germany’s largest online social lending platform Smava.de to exemplarily study the contribution of unstructured, ambiguous, or unverified informatio...
Stefanie Pötzsch, Rainer Böhme
CCS
2007
ACM
15 years 10 months ago
Analyzing the vulnerability of superpeer networks against attack
In this paper, we develop an analytical framework to measure the vulnerability of superpeer networks against attack. Two different kinds of attacks namely deterministic and degre...
Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy ...
156
Voted
FC
2004
Springer
129views Cryptology» more  FC 2004»
15 years 9 months ago
A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves
Abstract. Systems for the support of customer relationship management are becoming increasingly attractive for vendors. Loyalty systems provide an interesting possibility for vendo...
Matthias Enzmann, Marc Fischlin, Markus Schneider ...
OOPSLA
2009
Springer
15 years 10 months ago
Supporting model evolution through demonstration-based model transformation
Model evolution is often supported by writing model transformation rules in specialized languages. This presents challenges to those who are unfamiliar with model transformation l...
Yu Sun
ACSAC
1999
IEEE
15 years 8 months ago
Architecture and Concepts of the ARGuE Guard
ARGuE (Advanced Research Guard for Experimentation) is a prototype guard being developed as a basis for experimentation. ARGuE is based on Network Associates' Gauntlet firewa...
Jeremy Epstein