Sciweavers

2478 search results - page 85 / 496
» Message from the Chair
Sort
View
DSN
2000
IEEE
15 years 8 months ago
From Crash Fault-Tolerance to Arbitrary-Fault Tolerance: Towards a Modular Approach
This paper presents a generic methodology to transform a protocol resilient to process crashes into one resilient to arbitrary failures in the case where processes run the same te...
Roberto Baldoni, Jean-Michel Hélary, Michel...
PERCOM
2003
ACM
16 years 3 months ago
Mobile Link Services with MQSeries Everyplace
The Open Hypermedia model is based upon the separation of hypertext links from documents and treats them as separate entities. Distributed link services take this approach and imp...
Sanjay Vivek, Kenneth Tso, David De Roure
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
15 years 10 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ESWS
2009
Springer
15 years 10 months ago
Semanta - Semantic Email in Action
Semanta is a system supporting Semantic Email, implemented as an add-in to two popular Mail User Agents, using existing email transport technology and integrated with the Social Se...
Simon Scerri, Ioana Giurgiu, Brian Davis, Siegfrie...
ICDCSW
2007
IEEE
15 years 10 months ago
Taxonomy of Email Reputation Systems
Today a common goal in the area of email security is to provide protection from a wide variety of threats by being more predictive instead of reactive and to identify legitimate m...
Dmitri Alperovitch, Paul Judge, Sven Krasser