Sciweavers

986 search results - page 68 / 198
» Protecting the Intranet Against
Sort
View
IPPS
2006
IEEE
15 years 10 months ago
Coordinate transformation - a solution for the privacy problem of location based services?
Protecting location information of mobile users in Location Based Services (LBS) is a very important but quite difficult and still largely unsolved problem. Location information h...
Andreas Gutscher
ISPAN
2005
IEEE
15 years 10 months ago
Minimum Cost Paths Subject to Minimum Vulnerability for Reliable Communications
Abstract—In real networks, disjoint paths are needed for providing protection against single link/node failure. When disjoint paths cannot be found, an alternative solution is to...
Bing Yang, Mei Yang, Jianping Wang, S. Q. Zheng
ECSQARU
2005
Springer
15 years 10 months ago
Molecular Fragment Mining for Drug Discovery
The main task of drug discovery is to find novel bioactive molecules, i.e., chemical compounds that, for example, protect human cells against a virus. One way to support solving t...
Christian Borgelt, Michael R. Berthold, David E. P...
ACNS
2004
Springer
284views Cryptology» more  ACNS 2004»
15 years 10 months ago
SQLrand: Preventing SQL Injection Attacks
We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible through a web frontend, and take advantage of flaws in...
Stephen W. Boyd, Angelos D. Keromytis
ICALP
2003
Springer
15 years 9 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...