Sciweavers

15379 search results - page 66 / 3076
» Protecting users from
Sort
View
CIIA
2009
13 years 8 months ago
Sharing and Protecting Networked Digital Life Memories
The increasing power of computers, increasing capacity of digital memory and wider availability of a great variety of input devices such as cameras and video recorders, has resulte...
Madjid Merabti
SOUPS
2006
ACM
14 years 1 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
INFOCOM
2009
IEEE
14 years 2 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
ISCAS
2005
IEEE
165views Hardware» more  ISCAS 2005»
14 years 1 months ago
An area-efficient and protected network interface for processing-in-memory systems
Abstract- This paper describes the implementation of an areaefficient and protected user memory-mapped network interface, the pbuf (Parcel Buffer), for the Data IntensiVe Architect...
Sumit D. Mediratta, Craig S. Steele, Jeff Sondeen,...
ITRUST
2004
Springer
14 years 1 months ago
E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities
This paper presents the design of a new middleware which provides support for trust and accountability in distributed data sharing communities. One application is in the context of...
Paul Ruth, Dongyan Xu, Bharat K. Bhargava, Fred Re...