Sciweavers

103 search results - page 14 / 21
» Controlling Spam by Secure Internet Content Selection
Sort
View
ACNS
2003
Springer
132views Cryptology» more  ACNS 2003»
14 years 26 days ago
Trust on Web Browser: Attack vs. Defense
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
Tieyan Li, Yongdong Wu
VIP
2001
13 years 9 months ago
Web-based Image Authentication Using Invisible Fragile Watermark
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret i...
Yusuk Lim, Changsheng Xu, David Dagan Feng
SIGCOMM
2004
ACM
14 years 1 months ago
A comparison of overlay routing and multihoming route control
The limitations of BGP routing in the Internet are often blamed for poor end-to-end performance and prolonged connectivity interruptions. Recent work advocates using overlays to e...
Aditya Akella, Jeffrey Pang, Bruce M. Maggs, Srini...
ICDE
2005
IEEE
109views Database» more  ICDE 2005»
14 years 1 months ago
Advanced Metadata for Privacy-Aware Representation of Credentials
Semantic Web languages like OWL and RDFS promise to be viable means for representing metadata describing users and resources available over the Internet. Recently, interest has be...
Paolo Ceravolo, Ernesto Damiani, Sabrina De Capita...
ERCIMDL
2006
Springer
114views Education» more  ERCIMDL 2006»
13 years 11 months ago
Towards a Digital Library for Language Learning
Digital libraries have untapped potential for supporting language teaching and learning. Although the Internet at large is widely used for language education, it has critical disad...
Shaoqun Wu, Ian H. Witten