Sciweavers

6844 search results - page 1135 / 1369
» Web Service Security
Sort
View
IH
2001
Springer
15 years 8 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
COMPSAC
2000
IEEE
15 years 8 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...
IPPS
2000
IEEE
15 years 8 months ago
A Requirements Analysis for Parallel KDD Systems
Abstract. The current generation of data mining tools have limited capacity and performance, since these tools tend to be sequential. This paper explores a migration path out of th...
William Maniatty, Mohammed Javeed Zaki
ICTAI
1999
IEEE
15 years 8 months ago
Cognitive Packet Networks
Reliability, security, scalability and QoS (Quality-of-Service) have become key issues as we envision the future Internet. This paper presents the "Cognitive Packet Network (C...
Erol Gelenbe, Zhiguang Xu, Esin Seref
FM
1999
Springer
93views Formal Methods» more  FM 1999»
15 years 8 months ago
Group Principals and the Formalization of Anonymity
We introduce the concept of a group principal and present a number of different classes of group principals, including threshold-group-principals. These appear to naturally usefu...
Paul F. Syverson, Stuart G. Stubblebine
« Prev « First page 1135 / 1369 Last » Next »