In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...
The idealdistributed file system wouldprovide all its userswith coherent,shared access tothe samesetoffiles,yetwould be arbitrarily scalable to provide more storage space and hi...
Chandramohan A. Thekkath, Timothy Mann, Edward K. ...
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Sharing content over a mobile network through opportunistic contacts has recently received considerable attention. In proposed scenarios, users store content they download in a lo...
Background: Standardization of analytical approaches and reporting methods via community-wide collaboration can work synergistically with web-tool development to result in rapid c...
Adam J. Carroll, Murray R. Badger, A. Harvey Milla...