Sciweavers

1790 search results - page 222 / 358
» On Privacy Models for RFID
Sort
View
ICDE
2007
IEEE
110views Database» more  ICDE 2007»
15 years 10 months ago
Modeling Quality of Information in Multi-sensor Surveillance Systems
Current surveillance systems use multiple sensors and media processing techniques in order to record/detect information of interest in terms of events. Assessing the quality of in...
M. Anwar Hossain, Pradeep K. Atrey, Abdulmotaleb E...
SAFECOMP
2007
Springer
15 years 10 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
AIRWEB
2005
Springer
15 years 9 months ago
Blocking Blog Spam with Language Model Disagreement
We present an approach for detecting link spam common in blog comments by comparing the language models used in the blog post, the comment, and pages linked by the comments. In co...
Gilad Mishne, David Carmel, Ronny Lempel
CRYPTO
2004
Springer
91views Cryptology» more  CRYPTO 2004»
15 years 9 months ago
Non-interactive Timestamping in the Bounded Storage Model
A timestamping scheme is non-interactive if a stamper can stamp a document without communicating with any other player. The only communication done is at validation time. Non-Inte...
Tal Moran, Ronen Shaltiel, Amnon Ta-Shma
150
Voted
TDSC
2010
172views more  TDSC 2010»
14 years 10 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...