Sciweavers

2659 search results - page 7 / 532
» Do we mean the same
Sort
View
ACMICEC
2006
ACM
186views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
Distrust and trust in B2C e-commerce: do they differ?
Researchers have not studied e-commerce distrust as much as ecommerce trust. This study examines whether trust and distrust are distinct concepts. If trust and distrust are the sa...
D. Harrison McKnight, Vivek Choudhury
CEC
2008
IEEE
14 years 2 months ago
An approach to intrusion detection by means of idiotypic networks paradigm
Abstract— In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDIS), that aims at dealing with large scale network attacks feat...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
IPPS
2008
IEEE
14 years 2 months ago
Adaptive and dynamic intrusion detection by means of idiotypic networks paradigm
—In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring vari...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
ASIACRYPT
1999
Springer
14 years 6 hour ago
Doing More with Fewer Bits
We present a variant of the Diffie-Hellman scheme in which the number of bits exchanged is one third of what is used in the classical Diffie-Hellman scheme, while the offered secu...
Andries E. Brouwer, Ruud Pellikaan, Eric R. Verheu...
SAGT
2009
Springer
136views Game Theory» more  SAGT 2009»
14 years 2 months ago
Doing Good with Spam Is Hard
We study economic means to improve network performance in the well-known game theoretic traffic model due to Wardrop. We introduce two sorts of spam flow - auxiliary and adversari...
Martin Hoefer, Lars Olbrich, Alexander Skopalik