Sciweavers

579 search results - page 78 / 116
» Secure Access to Medical Data over the Internet
Sort
View
WWW
2009
ACM
16 years 2 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
CCS
2003
ACM
15 years 6 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
WEBDB
2005
Springer
83views Database» more  WEBDB 2005»
15 years 7 months ago
Indexing for XML Siblings
Efficient querying XML documents is an increasingly important issue considering the fact that XML becomes the de facto standard for data representation and exchange over the Web,...
SungRan Cho
LSGRID
2004
Springer
15 years 7 months ago
Development of a Grid Infrastructure for Functional Genomics
The BRIDGES project is incrementally developing and exploring database integration over six geographically distributed research sites with the framework of a Wellcome Trust biomedi...
Richard O. Sinnott, Micha Bayer, Derek Houghton, D...
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 11 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano