Sciweavers

15379 search results - page 317 / 3076
» Protecting users from
Sort
View
116
Voted
CCS
2005
ACM
15 years 9 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov
139
Voted
DRM
2005
Springer
15 years 9 months ago
Towards a software architecture for DRM
The domain of digital rights management (DRM) is currently lacking a generic architecture that supports interoperability and reuse of specific DRM technologies. This lack of arch...
Sam Michiels, Kristof Verslype, Wouter Joosen, Bar...
SIGCOMM
2004
ACM
15 years 9 months ago
A first-principles approach to understanding the internet's router-level topology
A detailed understanding of the many facets of the Internet’s topological structure is critical for evaluating the performance of networking protocols, for assessing the effecti...
Lun Li, David Alderson, Walter Willinger, John Doy...
114
Voted
WS
2004
ACM
15 years 9 months ago
A framework for wireless LAN monitoring and its applications
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of th...
Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala
125
Voted
DILS
2006
Springer
15 years 7 months ago
An Extensible Light-Weight XML-Based Monitoring System for Sequence Databases
Life science researchers want biological information in their interest to become available to them as soon as possible. A monitoring system is a solution that relieves biologists f...
Dieter Van de Craen, Frank Neven, Kerstin Koch