Sciweavers

621 search results - page 90 / 125
» Security of Internet Location Management
Sort
View
TIFS
2010
186views more  TIFS 2010»
15 years 9 days ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
ACSAC
2010
IEEE
14 years 12 months ago
Breaking e-banking CAPTCHAs
Many financial institutions have deployed CAPTCHAs to protect their services (e.g., e-banking) from automated attacks. In addition to CAPTCHAs for login, CAPTCHAs are also used to...
Shujun Li, S. Amier Haider Shah, M. Asad Usman Kha...
AAAIDEA
2005
IEEE
15 years 7 months ago
A Peer-to-Peer Infrastructure for Resilient Web Services
This paper describes an infrastructure for the deployment and use of Web Services that are resilient to the failure of the nodes that host those services. The infrastructure prese...
Stuart J. Norcross, Alan Dearle, Graham N. C. Kirb...
WWW
2008
ACM
16 years 2 months ago
Spatial variation in search engine queries
Local aspects of Web search -- associating Web content and queries with geography -- is a topic of growing interest. However, the underlying question of how spatial variation is m...
Lars Backstrom, Jon M. Kleinberg, Ravi Kumar, Jasm...
WEBI
2007
Springer
15 years 8 months ago
Measuring Semantic Similarity between Named Entities by Searching the Web Directory
The importance of named entities in information retrieval and knowledge management has recently brought interest in characterizing semantic relationships between entities. In this...
Jiahui Liu, Larry Birnbaum