Sciweavers

2702 search results - page 129 / 541
» Message from the Editor
Sort
View
CEAS
2011
Springer
12 years 10 months ago
Spam detection using web page content: a new battleground
Traditional content-based e-mail spam filtering takes into account content of e-mail messages and apply machine learning techniques to infer patterns that discriminate spams from...
Marco Túlio Ribeiro, Pedro Henrique Calais ...
ICPADS
2006
IEEE
14 years 4 months ago
Snap-Stabilizing PIF and Useless Computations
A snap-stabilizing protocol, starting from any configuration, always behaves according to its specification. In other words, a snap-stabilizing protocol is a self-stabilizing pr...
Alain Cournier, Stéphane Devismes, Vincent ...
ITCC
2005
IEEE
14 years 3 months ago
An Analysis of Reliable Delivery Specifications for Web Services
Reliable delivery of messages is now a key component of the Web Services roadmap, with two promising, and competing, specifications in this area viz. WS-Reliability (WSR) from OAS...
Shrideep Pallickara, Geoffrey Fox, Sangmi Lee Pall...
IJNSEC
2006
113views more  IJNSEC 2006»
13 years 10 months ago
An Identity-based Mediated Signature Scheme from Bilinear Pairing
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in identity (ID)based cryptosystems. Unfortunately, none of the previou...
Xiangguo Cheng, Lifeng Guo, Xinmei Wang
ESORICS
2002
Springer
14 years 9 months ago
Analysing a Stream Authentication Protocol Using Model Checking
Abstract. In this paper, we consider how one can analyse a stream authentication protocol using model checking techniques. In particular, we will be focusing on the Timed Efficient...
Philippa J. Broadfoot, Gavin Lowe