Sciweavers

2904 search results - page 482 / 581
» Internet Infrastructure Security
Sort
View
ESORICS
2005
Springer
14 years 4 months ago
Privacy Preserving Clustering
The freedom and transparency of information flow on the Internet has heightened concerns of privacy. Given a set of data items, clustering algorithms group similar items together...
Somesh Jha, Louis Kruger, Patrick McDaniel
EUROPKI
2005
Springer
14 years 4 months ago
A Multipurpose Delegation Proxy for WWW Credentials
Credentials like passwords or cryptographic key pairs are a means to prove one’s identity to a web server. A practical problem in this context is the question of how a user can t...
Tobias Straub, Thilo-Alexander Ginkel, Johannes Bu...
PET
2005
Springer
14 years 4 months ago
Failures in a Hybrid Content Blocking System
Abstract. Three main methods of content blocking are used on the Internet: blocking routes to particular IP addresses, blocking specific URLs in a proxy cache or firewall, and pr...
Richard Clayton
ASIASIM
2004
Springer
14 years 4 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
VLDB
2004
ACM
147views Database» more  VLDB 2004»
14 years 4 months ago
Client-Based Access Control Management for XML documents
The erosion of trust put in traditional database servers and in Database Service Providers, the growing interest for different forms of data dissemination and the concern for prot...
Luc Bouganim, François Dang Ngoc, Philippe ...