Sciweavers

197 search results - page 5 / 40
» A Survey of Trust in Internet Applications
Sort
View
IMC
2005
ACM
14 years 1 months ago
Perils of Transitive Trust in the Domain Name System
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results f...
Venugopalan Ramasubramanian, Emin Gün Sirer
IJACTAICIT
2010
99views more  IJACTAICIT 2010»
13 years 2 months ago
Utilizing Trusted Platform Module to Mitigate Botnet Attacks
Ever since, internet banking came into existence it has been a bull's eye for the hackers. Up to date, several cases have been reported by internet banking users for missing ...
Muththolib Sidheeq, Ali Dehghantanha, Geetha Kanan...
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
14 years 1 months ago
Online Fundraising for Environmental Nonprofit Organizations
Although the Internet provides nonprofit organizations with unprecedented opportunities for fundraising, the volume of online donations has been miniscule. Since one reason for th...
Irene Pollach, Horst Treiblmaier, Arne Floh
ICDCS
2005
IEEE
14 years 1 months ago
Virtual Leashing: Internet-Based Software Piracy Protection
Software-splitting is a technique for protecting software from piracy by removing code fragments from an application and placing them on a remote trusted server. The server provid...
Ori Dvir, Maurice Herlihy, Nir Shavit
CN
2008
76views more  CN 2008»
13 years 7 months ago
Fast retransmit and fast recovery schemes of transport protocols: A survey and taxonomy
Although there are two standard transport protocols, TCP and UDP, offering services in the Internet, the majority of the traffic over the Internet is TCP-based. TCP-based applicat...
Cheng-Yuan Ho, Yaw-Chung Chen, Yi-Cheng Chan, Chen...