Sciweavers

940 search results - page 96 / 188
» A Digital Teletext Service
Sort
View
ACSAC
1998
IEEE
14 years 4 days ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
FEGC
2006
92views Biometrics» more  FEGC 2006»
13 years 9 months ago
Maintaining an Online Bibliographical Database: The Problem of Data Quality
CiteSeer and Google-Scholar are huge digital libraries which provide access to (computer-)science publications. Both collections are operated like specialized search engines, they ...
Michael Ley, Patrick Reuther
ESORICS
2009
Springer
14 years 8 months ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
JCDL
2009
ACM
134views Education» more  JCDL 2009»
14 years 2 months ago
What happens when facebook is gone?
Web users are spending more of their time and creative energies within online social networking systems. While many of these networks allow users to export their personal data or ...
Frank McCown, Michael L. Nelson
SP
2007
IEEE
120views Security Privacy» more  SP 2007»
14 years 2 months ago
Endorsed E-Cash
An electronic cash (e-cash) scheme lets a user withdraw money from a bank and then spend it anonymously. E-cash can be used only if it can be securely and fairly exchanged for ele...
Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich