Sciweavers

6844 search results - page 1104 / 1369
» Web Service Security
Sort
View
118
Voted
ESORICS
2009
Springer
15 years 11 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
119
Voted
SAINT
2009
IEEE
15 years 11 months ago
Analyzing the Aftermath of the McColo Shutdown
This paper examines how spam behavior was impacted by the shutdown of McColo, a service provider known for its lax security enforcement. Since the shutdown, a variety of sources h...
Steve DiBenedetto, Daniel Massey, Christos Papadop...
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
15 years 11 months ago
De-anonymizing Social Networks
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and da...
Arvind Narayanan, Vitaly Shmatikov
NORDSEC
2009
Springer
15 years 11 months ago
A Parallelism-Based Approach to Network Anonymization
Considering topologies of anonymous networks we used to organizing anonymous communications into hard to trace paths, composed of several middleman nodes, towards hiding communicat...
Igor Margasinski
148
Voted
OOPSLA
2009
Springer
15 years 11 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...
« Prev « First page 1104 / 1369 Last » Next »