Sciweavers

15379 search results - page 279 / 3076
» Protecting users from
Sort
View
ICPP
1999
IEEE
14 years 18 days ago
Mobile-Agents for Distributed Market Computing
This paper discusses the implementation using mobile agent and the performance of the market computing to allocate network quality of service most efficiently, based on users'...
Shinji Tanaka, Hirofumi Yamaki, Toru Ishida
CEAS
2008
Springer
13 years 10 months ago
On Free Speech and Civil Discourse: Filtering Abuse in Blog Comments
Internet blogs provide forums for discussions within virtual communities, allowing readers to post comments on what they read. However, such comments may contain abuse, such as pe...
D. Sculley
ACSAC
2008
IEEE
13 years 8 months ago
YAGP: Yet Another Graphical Password Strategy
Alphanumeric passwords are widely used in computer and network authentication to protect users' privacy. However, it is well known that long, textbased passwords are hard for...
Haichang Gao, Xuewu Guo, Xiaoping Chen, Liming Wan...
WPES
2005
ACM
14 years 1 months ago
The privacy cost of the second-chance offer
This paper examines a generalization of a two-stage game common on eBay: an ascending-price auction followed by price discrimination (the second chance offer). High bids in the a...
Sumit Joshi, Yu-An Sun, Poorvi L. Vora
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 5 days ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...