Sciweavers

390 search results - page 41 / 78
» Case Study: Interactive Visualization for Internet Security
Sort
View
IEEEVAST
2010
13 years 2 months ago
Understanding text corpora with multiple facets
Text visualization becomes an increasingly more important research topic as the need to understand massive-scale textual information is proven to be imperative for many people and...
Lei Shi, Furu Wei, Shixia Liu, Li Tan, Xiaoxiao Li...
IWPC
2003
IEEE
14 years 29 days ago
Scaling an Object-Oriented System Execution Visualizer through Sampling
Increasingly, applications are being built by combining existing software components. For the most part, a software developer can treat components as black-boxes. However, for som...
Andrew Chan, Reid Holmes, Gail C. Murphy, Annie T....
ESORICS
2006
Springer
13 years 11 months ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang
CBMS
2004
IEEE
13 years 11 months ago
Online Medical Teaching Case Database
Page >> Table of Contents >> Abstract 17th IEEE Symposium on Computer-Based Medical Systems (CBMS'04) p. 420 Online Medical Teaching Case Database Susan Kansagra, ...
Susan Kansagra, Chris Chang, Saleem Hussain, Grego...
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
14 years 8 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin