Sciweavers

14824 search results - page 102 / 2965
» Security - Introduction
Sort
View
IMCS
2008
58views more  IMCS 2008»
15 years 2 months ago
Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer
Purpose
Yoones Asgharzadeh Sekhavat, Mohammad Fathian
CCS
2011
ACM
14 years 2 months ago
Unicorn: two-factor attestation for data security
Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, Da...
ESORICS
2007
Springer
15 years 8 months ago
On the Privacy of Concealed Data Aggregation
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
Aldar C.-F. Chan, Claude Castelluccia
ESORICS
2009
Springer
16 years 3 months ago
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
Thorsten Holz, Markus Engelberth, Felix C. Freilin...
CCS
2009
ACM
16 years 3 months ago
An integrated approach to detection of fast and slow scanning worms
Frank Akujobi, Ioannis Lambadaris, Evangelos Krana...