Sciweavers

8701 search results - page 74 / 1741
» Protecting information on the Web
Sort
View
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
14 years 2 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir
JSW
2007
90views more  JSW 2007»
13 years 10 months ago
Fine-Grained and Scalable Message Protection in Sensitive Organizations
Abstract— Today electronic messaging services are indispensable to individuals and organizations. If a message contains sensitive information, the integrity and confidentiality ...
Joon S. Park, Ganesh Devarajan
HICSS
2005
IEEE
120views Biometrics» more  HICSS 2005»
14 years 3 months ago
Information Retrieval and the Semantic Web
Information retrieval technology has been central to the success of the Web. For semantic web documents or annotations to have an impact, they will have to be compatible with Web ...
Timothy W. Finin, James Mayfield, Anupam Joshi, R....
ICDE
2010
IEEE
194views Database» more  ICDE 2010»
14 years 9 months ago
XColor: Protecting General Proximity Privacy
As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensit...
Ting Wang, Ling Liu
WWW
2010
ACM
14 years 5 months ago
The social honeypot project: protecting online communities from spammers
We present the conceptual framework of the Social Honeypot Project for uncovering social spammers who target online communities and initial empirical results from Twitter and MySp...
Kyumin Lee, James Caverlee, Steve Webb