Sciweavers

905 search results - page 158 / 181
» Public key distribution through
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis
The Domain Name System (DNS) is the world’s largest distributed computing system that performs the key function of translating user-friendly domain names to IP addresses through...
Ramaswamy Chandramouli, Scott Rose
IH
2005
Springer
14 years 2 months ago
Censorship Resistance Revisited
Abstract. “Censorship resistant” systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation ...
Ginger Perng, Michael K. Reiter, Chenxi Wang
STEP
2003
IEEE
14 years 1 months ago
On Analysis of Design Component Contracts: A Case Study
Software patterns are a new design paradigm used to solve problems that arise when developing software within a particular context. Patterns capture the static and dynamic structu...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
LREC
2008
107views Education» more  LREC 2008»
13 years 10 months ago
The Construction and Evaluation of Word Space Models
Semantic similarity is a key issue in many computational tasks. This paper goes into the development and evaluation of two common ways of automatically calculating the semantic si...
Yves Peirsman, Simon De Deyne, Kris Heylen, Dirk G...
ENTCS
2008
130views more  ENTCS 2008»
13 years 8 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...