Sciweavers

187 search results - page 22 / 38
» Challenges in Securing the Domain Name System
Sort
View
IACR
2011
82views more  IACR 2011»
12 years 10 months ago
Wild McEliece Incognito
The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of se...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...
CLIN
2004
14 years 10 days ago
Automatic Summarization of Meeting Data: A Feasibility Study
The disclosure of audio-visual meeting recordings is a new challenging domain studied by several large scale research projects in Europe and the US. Automatic meeting summarizatio...
Anne Hendrik Buist, Wessel Kraaij, Stephan Raaijma...
USENIX
2000
14 years 8 days ago
The Globe Distribution Network
The goal of the Globe project is to design and build a middleware platform that facilitates the development of large-scale distributed applications, such as those found on the Int...
Arno Bakker, E. Amade, Gerco Ballintijn, Ihor Kuz,...
INTENV
2010
13 years 5 months ago
Proactive Intention Recognition for Home Ambient Intelligence
We explore a coherent combination of two jointly implemented logic programming based systems, namely those of Evolution Prospection and Intention Recognition, to address a number o...
Han The Anh, Luís Moniz Pereira
ACSAC
2007
IEEE
14 years 5 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...