Sciweavers

483 search results - page 36 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
118
Voted
IEEEARES
2010
IEEE
15 years 10 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
126
Voted
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
16 years 20 days ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
128
Voted
DAGSTUHL
2006
15 years 4 months ago
Towards UML Modelling Extra-Functional Properties in Web Services and their Clients
Web Services provide our systems with a platform independent and loosely coupled implementation environment, being time to face how the named systems can be modelled. Service Compo...
Guadalupe Ortiz, Juan Hernández
141
Voted
WWW
2005
ACM
16 years 4 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
ICEBE
2007
IEEE
182views Business» more  ICEBE 2007»
15 years 9 months ago
Service-Oriented Business Process Modeling and Performance Evaluation based on AHP and Simulation
With the evolution of Grid technologies and the application of Service-Oriented Architecture (SOA), more and more enterprises are integrated and collaborated with each other in a ...
Sen Zeng, Shuangxi Huang, Yushun Fan