Sciweavers

2601 search results - page 384 / 521
» Secure Rewarding Schemes
Sort
View
PET
2010
Springer
15 years 7 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg
SP
2010
IEEE
192views Security Privacy» more  SP 2010»
15 years 7 months ago
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation
—Captchas are designed to be easy for humans but hard for machines. However, most recent research has focused only on making them hard for machines. In this paper, we present wha...
Elie Bursztein, Steven Bethard, Celine Fabry, John...
ICDCS
2009
IEEE
16 years 14 days ago
Distributed Key Generation for the Internet
Although distributed key generation (DKG) has been studied for some time, it has never been examined outside of the synchronous setting. We present the first realistic DKG archit...
Aniket Kate, Ian Goldberg
WIMOB
2008
IEEE
15 years 9 months ago
Authentication in a Multi-access IMS Environment
– The standard ISIM-based authentication mechanism of IMS is only intended for mobile phones and cannot be used for fixed IMS clients on stationary devices without SIM cards. Thi...
Do Van Thanh, Ivar Jørstad, Paal E. Engelst...
130
Voted
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 9 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...