Sciweavers

262 search results - page 37 / 53
» Secure Hamming Distance Based Computation and Its Applicatio...
Sort
View
DIM
2008
ACM
14 years 10 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
IWCMC
2006
ACM
15 years 3 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
DEBS
2008
ACM
14 years 11 months ago
Access control in publish/subscribe systems
Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to t...
Jean Bacon, David M. Eyers, Jatinder Singh, Peter ...
ALGORITHMICA
2004
111views more  ALGORITHMICA 2004»
14 years 9 months ago
The Hausdorff Voronoi Diagram of Point Clusters in the Plane
We study the Hausdorff Voronoi diagram of point clusters in the plane, a generalization of Voronoi diagrams based on the Hausdorff distance function. We derive a tight combinatori...
Evanthia Papadopoulou
PST
2008
14 years 11 months ago
Encoding the Program Correctness Proofs as Programs in PCC Technology
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating and storing the proofs which are inh...
Heidar Pirzadeh, Danny Dubé