Sciweavers

1693 search results - page 233 / 339
» Interference-Resilient Information Exchange
Sort
View
RAID
1999
Springer
15 years 8 months ago
Session State Transition Based Large Network IDS
In order to present large-scale malicious attacks on an ISP network to maintain network services, we have designed a method to record key packets classified by sessions. Session i...
Qianli Zhang, Xing Li
GROUP
1993
ACM
15 years 8 months ago
ASCW: an assistant for cooperative work
The Assistant for Cooperative Work (ASCW) is a powerful system for the management of distributed work. It consists of the Task Manager, the organizational information system TOSCA...
Thomas Kreifelts, Wolfgang Prinz
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Secure Identification and QKD in the Bounded-Quantum-Storage Model
We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 8 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
ICDCS
2010
IEEE
15 years 8 months ago
E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity
—Small talk is an important social lubricant that helps people, especially strangers, initiate conversations and make friends with each other in physical proximity. However, due ...
Zhimin Yang, Boying Zhang, Jiangpeng Dai, Adam C. ...