Sciweavers

13383 search results - page 2392 / 2677
» Abstractions from proofs
Sort
View
PET
2005
Springer
15 years 9 months ago
Privacy Vulnerabilities in Encrypted HTTP Streams
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...
PET
2005
Springer
15 years 9 months ago
Anonymity Preserving Techniques in Trust Negotiations
Trust negotiation between two subjects require each one proving its properties to the other. Each subject specifies disclosure policies stating the types of credentials and attrib...
Indrakshi Ray, Elisa Bertino, Anna Cinzia Squiccia...
135
Voted
PKDD
2005
Springer
129views Data Mining» more  PKDD 2005»
15 years 9 months ago
Interestingness is Not a Dichotomy: Introducing Softness in Constrained Pattern Mining
Abstract. The paradigm of pattern discovery based on constraints was introduced with the aim of providing to the user a tool to drive the discovery process towards potentially inte...
Stefano Bistarelli, Francesco Bonchi
140
Voted
PREMI
2005
Springer
15 years 9 months ago
Computational Molecular Biology of Genome Expression and Regulation
Abstract. Technological advances in experimental and computational molecular biology have revolutionized the whole fields of biology and medicine. Large-scale sequencing, expressio...
Michael Q. Zhang
137
Voted
SSS
2005
Springer
132views Control Systems» more  SSS 2005»
15 years 9 months ago
Self-stabilizing Mobile Node Location Management and Message Routing
We present simple algorithms for achieving self-stabilizing location management and routing in mobile ad-hoc networks. While mobile clients may be susceptible to corruption and sto...
Shlomi Dolev, Limor Lahiani, Nancy A. Lynch, Tina ...
« Prev « First page 2392 / 2677 Last » Next »