Sciweavers

47 search results - page 10 / 10
» Evaluation of Sybil Attacks Protection Schemes in KAD
Sort
View
ASIACRYPT
2003
Springer
14 years 3 months ago
The Insecurity of Esign in Practical Implementations
Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards a...
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwena&e...
CIKM
2005
Springer
14 years 3 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...