Sciweavers

162 search results - page 22 / 33
» Securing Email Archives through User Modeling
Sort
View
SE
2007
13 years 9 months ago
Integration models in a .NET plug-in framework
Abstract: Applications based on plug-in architectures are extensible through thirdparties and enable customized user environments. We argue that extensibility and customization are...
Reinhard Wolfinger, Herbert Prähofer
NOSSDAV
2010
Springer
14 years 8 days ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
ICDE
2009
IEEE
180views Database» more  ICDE 2009»
14 years 9 months ago
Outsourcing Search Services on Private Spatial Data
Social networking and content sharing service providers, e.g., Facebook and Google Maps, enable their users to upload and share a variety of user-generated content, including locat...
Man Lung Yiu, Gabriel Ghinita, Christian S. Jensen...
PET
2012
Springer
11 years 10 months ago
Understanding Statistical Disclosure: A Least Squares Approach
It is widely accepted that Disclosure Attacks are effective against high-latency anonymous communication systems. A number of Disclosure Attack variants can be found in the litera...
Fernando Pérez-González, Carmela Tro...
CORR
2007
Springer
114views Education» more  CORR 2007»
13 years 7 months ago
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels
—The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransm...
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. ...