Sciweavers

5324 search results - page 890 / 1065
» Internet Security Protocols
Sort
View
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 3 months ago
On the Stability of the Malware Free Equilibrium in Cell Phones Networks with Spatial Dynamics
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have bought to the forefront the seriousness of the security threat to this increasingly popular mean...
Krishna K. Ramachandran, Biplab Sikdar
FC
2007
Springer
111views Cryptology» more  FC 2007»
14 years 3 months ago
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks
Abstract. In this usability study of phishing attacks and browser antiphishing defenses, 27 users each classified 12 web sites as fraudulent or legitimate. By dividing these users...
Collin Jackson, Daniel R. Simon, Desney S. Tan, Ad...
OOPSLA
2007
Springer
14 years 3 months ago
Swashup: situational web applications mashups
Distributed programming has shifted from private networks to the Internet using heterogeneous Web APIs. This enables the creation of situational applications of composed services ...
E. Michael Maximilien, Ajith Ranabahu, Stefan Tai
DASC
2006
IEEE
14 years 3 months ago
Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services
Abstract— This paper describes Service Clouds, a distributed infrastructure designed to facilitate rapid prototyping and deployment of services that enhance communication perform...
Philip K. McKinley, Farshad A. Samimi, Jonathan K....
ICICIC
2006
IEEE
14 years 3 months ago
Relational Databases Watermark Technique Based on Content Characteristic
With the development of the Internet and wide applications of databases, the databases providers are worrying about their ownership of the databases. Combined with the digital wat...
Yong Zhang, Xiamu Niu, Dongning Zhao, Juncao Li, S...