Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Abstract— This paper proposes the ASIMcast (Any-Source Implicit Multicast) protocol which builds a bidirectional tree for routing of multicast traffic. ASIMcast includes feature...
Track 2 - Modeling and Abstraction of Services Process Session Chair: Dynamic Service Invocation Control in Service Composition Environments (SCC2010-2004) ...........................
For system-on-chip designs that contain an embedded processor, this paper present a software based diagnosis scheme that can make use of the processor to aid in diagnosis in a sca...
Collaborative Browsing is a new and promising research area whose purpose is to provide new collaboration schemes among users browsing the Web. To become an efficient collaboratio...