Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
An Educational Virtual Environment (EVE) is an instance of a Collaborative Virtual Environment (CVE), which focalises in providing collaborative, as well as educational, functiona...
Christos Bouras, Eri Giannaka, Thrasyvoulos Tsiats...
— Web service models are increasingly being used in the Grid community as way to create distributed applications exposing data and/or applications through self describing interfa...
Kyle Chard, Wei Tan, Joshua Boverhof, Ravi K. Madd...
There has been much recent work on algorithms for limiting disclosure in data publishing. However, these algorithms have not been put to use in any comprehensive, usable toolkit f...