Sciweavers

2207 search results - page 345 / 442
» Security at the Internet Layer
Sort
View
158
Voted
ACSAC
2007
IEEE
15 years 11 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...
134
Voted
IEEEARES
2007
IEEE
15 years 11 months ago
A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network
We propose a practical verifiable e-voting protocol which guarantees e-voting requirements: privacy, eligibility, uniqueness, uncoercibility, fairness, accuracy, robustness, indiv...
Orhan Cetinkaya, Ali Doganaksoy
IPCCC
2007
IEEE
15 years 11 months ago
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture
— Recently, there has been increased interest, shown by the research community and by industry fora, to enable emergency services for voice-over-IP based architectures. In order ...
Hannes Tschofenig, Henning Schulzrinne, Murugaraj ...
CCS
2007
ACM
15 years 10 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
ISI
2007
Springer
15 years 10 months ago
Visualization of Events in a Spatially and Multimedia Enriched Virtual Environment
—Semantic Event Tracker (SET) is a highly interactive visualization tool for tracking and associating activities (events) in a spatially and Multimedia Enriched Virtual Environme...
Leonidas Deligiannidis, Farshad Hakimpour, Amit P....