Sciweavers

680 search results - page 57 / 136
» Locating Hidden Servers
Sort
View
117
Voted
FC
2009
Springer
106views Cryptology» more  FC 2009»
15 years 10 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
114
Voted
COMPSAC
2007
IEEE
15 years 10 months ago
A Service Discovery Architecture based on Anycast in Pervasive Computing Environments
Service discovery is very useful in pervasive computing environments. A service discovery architecture based on anycast is proposed. A wellknown anycast address is defined first, ...
Li Zhang, Zhen-lian Shi, Qi Shen
132
Voted
CCS
2007
ACM
15 years 10 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
138
Voted
ICCSA
2005
Springer
15 years 9 months ago
An Intermediate Target for Quick-Relay of Remote Storage to Mobile Devices
Requests for application services that require large data space such as multimedia, game and database[1] have greatly increased. Nowadays those requests locomote for various servic...
Daegeun Kim, MinHwan Ok, Myong-Soon Park
142
Voted
EUROPKI
2004
Springer
15 years 9 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...