Sciweavers

12183 search results - page 27 / 2437
» Computers under Attacks!
Sort
View
IEEESCC
2005
IEEE
14 years 3 months ago
Knowledge as a Service and Knowledge Breaching
In this paper, we introduce and explore a new computing paradigm we call knowledge as a service, in which a knowledge service provider, via its knowledge server, answers queries p...
Shouhuai Xu, Weining Zhang
WWW
2007
ACM
14 years 10 months ago
Detectives: detecting coalition hit inflation attacks in advertising networks streams
Click fraud is jeopardizing the industry of Internet advertising. Internet advertising is crucial for the thriving of the entire Internet, since it allows producers to advertise t...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
ATC
2006
Springer
14 years 1 months ago
Development and Runtime Support for Situation-Aware Security in Autonomic Computing
Abstract. To overcome increasing complexity and dynamic nature of distributed computing system, such as ubiquitous computing systems, it is critical to have computing systems that ...
Stephen S. Yau, Yisheng Yao, Min Yan
CSFW
2006
IEEE
14 years 3 months ago
Computationally Sound Compositional Logic for Key Exchange Protocols
We develop a compositional method for proving cryptographically sound security properties of key exchange protocols, based on a symbolic logic that is interpreted over conventiona...
Anupam Datta, Ante Derek, John C. Mitchell, Bogdan...
ISW
2007
Springer
14 years 4 months ago
Enabling Fairer Digital Rights Management with Trusted Computing
Abstract. Today, digital content is routinely distributed over the Internet, and consumed in devices based on open platforms. However, on open platforms users can run exploits, rec...
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stü...