Sciweavers

1440 search results - page 8 / 288
» Third-Party Flow Control
Sort
View
120
Voted
IEEEARES
2010
IEEE
15 years 5 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
99
Voted
SIGECOM
1999
ACM
105views ECommerce» more  SIGECOM 1999»
15 years 4 months ago
Nark: receiver-based multicast non-repudiation and key management
The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders while preserving the scalability of receiver i...
Bob Briscoe, Ian Fairman
84
Voted
ACMICEC
2007
ACM
103views ECommerce» more  ACMICEC 2007»
15 years 4 months ago
Sampling of information goods
With the development of information technology and the emergence of electronic market places, great business opportunities are created with reduced spatial restraints, lowered sea...
Chong (Alex) Wang, Xiaoquan (Michael) Zhang
116
Voted
ETRICS
2006
15 years 4 months ago
A P2P Content Authentication Protocol Based on Byzantine Agreement
One of the main advantages of peer-to-peer (P2P) systems is their capability to offer replicas of the same content at various locations. This allows to access contents even when so...
Esther Palomar, Juan M. Estévez-Tapiador, J...
FC
1997
Springer
107views Cryptology» more  FC 1997»
15 years 4 months ago
An Efficient Micropayment System Based on Probabilistic Polling
Existing software proposals for electronic payments can be divided into "on-line" schemes that require participation of a trusted party (the bank) in every transaction an...
Stanislaw Jarecki, Andrew M. Odlyzko