Sciweavers

1573 search results - page 271 / 315
» Strong User Authentication
Sort
View
SIGECOM
2005
ACM
118views ECommerce» more  SIGECOM 2005»
15 years 3 months ago
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Copyright holders have been investigating technological solutions to prevent distribution of copyrighted materials in peer-to-peer file sharing networks. A particularly popular t...
Nicolas Christin, Andreas S. Weigend, John Chuang
EUROPAR
2005
Springer
15 years 3 months ago
A Grid Information Service Based on Peer-to-Peer
Abstract. Information Services are fundamental blocks of the Grid infrastructure. They are responsible for collecting and distributing information about resource availability and s...
Diego Puppin, Stefano Moncelli, Ranieri Baraglia, ...
ICANN
2005
Springer
15 years 3 months ago
Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behav...
Emilio Corchado, Álvaro Herrero, José...
OTM
2005
Springer
15 years 3 months ago
Don't Mind Your Vocabulary: Data Sharing Across Heterogeneous Peers
The strong dynamics of peer-to-peer networks, coupled with the diversity of peer vocabularies, makes query processing in peer database systems a very challenging task. In this pape...
Mehedi Masud, Iluju Kiringa, Anastasios Kementsiet...
PET
2005
Springer
15 years 3 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey