Sciweavers

1018 search results - page 149 / 204
» Remote User Authentication Using Public Information
Sort
View
IH
2004
Springer
14 years 1 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
DAWAK
2001
Springer
14 years 12 days ago
Towards a Novel OLAP Interface for Distributed Data Warehouses
We present a framework for visualizing remote distributed data sources using a multi-user immersive virtual reality environment. DIVE-ON is a system prototype that consolidates dis...
Ayman Ammoura, Osmar R. Zaïane, Randy Goebel
P2PKM
2004
13 years 9 months ago
RDFGrowth, a P2P annotation exchange algorithm for scalable Semantic Web applications
We present RDFGrowth, an algorithm that addresses a specific yet important scenario: large scale, end user targeted, metadata exchange P2P applications. In this scenario, peers per...
Giovanni Tummarello, Christian Morbidoni, Joackin ...
CHI
2011
ACM
12 years 11 months ago
Mediated parent-child contact in work-separated families
Parents and children in families living with regular separation due to work develop strategies to manage being apart. We interviewed 14 pairs of parents and children (ages 7 – 1...
Svetlana Yarosh, Gregory D. Abowd
SAC
2006
ACM
14 years 1 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...