Sciweavers

1191 search results - page 136 / 239
» Online Games and Security
Sort
View
OSDI
2008
ACM
14 years 11 months ago
From Optimization to Regret Minimization and Back Again
Internet routing is mostly based on static information-it's dynamicity is limited to reacting to changes in topology. Adaptive performance-based routing decisions would not o...
Ioannis C. Avramopoulos, Jennifer Rexford, Robert ...
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
14 years 5 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 5 months ago
Insuring Big Losses Due to Security Breaches through Insurance: A Business Model
Security breaches deter e-commerce activities. Organizations spend millions of dollars on security appliances to make online transactions more secure. Nonetheless, a new virus or ...
Arunabha Mukhopadhyay, Samir Chatterjee, Rahul Roy...
ASIACRYPT
2007
Springer
14 years 4 months ago
Miniature CCA2 PK Encryption: Tight Security Without Redundancy
ersion of an extended abstract to be published in Advances in Cryptology—ASIACRYPT 2007, Springer-Verlag, 2007. Available online from: http://www.cs.stanford.edu/∼xb/asiacrypt0...
Xavier Boyen
ECWEB
2000
Springer
110views ECommerce» more  ECWEB 2000»
14 years 3 months ago
Secure PC-Franking for Everyone
PC franking systems allow customers to download postage value into their PCs and to print postage value onto envelopes or mailing labels by using regular desktop printers connected...
Gerrit Bleumer