Sciweavers

119 search results - page 17 / 24
» Decentralized Electronic Mail
Sort
View
VIZSEC
2004
Springer
14 years 2 months ago
Email archive analysis through graphical visualization
The analysis of the vast storehouse of email content accumulated or produced by individual users has received relatively little attention other than for specific tasks such as spa...
Wei-Jen Li, Shlomo Hershkop, Salvatore J. Stolfo
ISSRE
2003
IEEE
14 years 2 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
HICSS
1999
IEEE
88views Biometrics» more  HICSS 1999»
14 years 1 months ago
A Cache Architecture for Modernizing the Usenet Infrastructure
Current Internet users see the combination of World-wide Web (WWW) and electronic mail as a synonym for the Internet. While WWW is excellent for easy and fast dissemination of inf...
Thomas Gschwind, Manfred Hauswirth
EUROCRYPT
1997
Springer
14 years 26 days ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
SIGCSE
1993
ACM
102views Education» more  SIGCSE 1993»
14 years 24 days ago
The internet programming contest: a report and philosophy
Programming contests can provide a high-profile method for attracting interest in computer science. We describe our philosophy as it pertains to the purpose and merits of program...
Vivek Khera, Owen L. Astrachan, David Kotz