Sciweavers

2904 search results - page 503 / 581
» Internet Infrastructure Security
Sort
View
CCS
2006
ACM
14 years 1 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
CN
2007
144views more  CN 2007»
13 years 9 months ago
SPP: An anti-phishing single password protocol
Most users have multiple accounts on the Internet where each account is protected by a password. To avoid the headache in remembering and managing a long list of different and un...
Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Moham...
ACSAC
2010
IEEE
13 years 7 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
TITB
2010
128views Education» more  TITB 2010»
13 years 4 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
WWW
2008
ACM
14 years 10 months ago
Extending the compatibility notion for abstract WS-BPEL processes
WS-BPEL Processes Dieter K?nig IBM B?blingen Laboratory Sch?naicher Stra?e 220, 71032 B?blingen, Germany dieterkoenig@de.ibm.com Niels Lohmann Universit?t Rostock, Institut f?r Inf...
Dieter König, Niels Lohmann, Simon Moser, Chr...