Sciweavers

4051 search results - page 754 / 811
» Aggregation
Sort
View
107
Voted
EXPCS
2007
15 years 6 months ago
Towards user-centric metrics for denial-of-service measurement
To date, the measurement of user-perceived degradation of quality of service during denial of service (DoS) attacks remained an elusive goal. Current approaches mostly rely on low...
Jelena Mirkovic, Alefiya Hussain, Brett Wilson, So...
134
Voted
SIGIR
2010
ACM
15 years 6 months ago
The demographics of web search
How does the web search behavior of “rich” and “poor” people differ? Do men and women tend to click on different results for the same query? What are some queries almost...
Ingmar Weber, Carlos Castillo
152
Voted
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
15 years 6 months ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
129
Voted
SOUPS
2010
ACM
15 years 6 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
137
Voted
EDBT
2009
ACM
145views Database» more  EDBT 2009»
15 years 6 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...