Sciweavers

471 search results - page 23 / 95
» Social applications: exploring a more secure framework
Sort
View
ESORICS
2010
Springer
13 years 8 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
HICSS
2010
IEEE
487views Biometrics» more  HICSS 2010»
14 years 2 months ago
A Survey of Game Theory as Applied to Network Security
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense attention from the research community for more than two de...
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipank...
AO
2007
144views more  AO 2007»
13 years 7 months ago
Social acquisition of ontologies from communication processes
This work introduces a formal framework for the social acquisition of ontologies which are constructed dynamically from overhearing the possibly conflicting symbolic interaction o...
Matthias Nickles
HCW
2000
IEEE
14 years 5 days ago
Design of a Framework for Data-Intensive Wide-Area Applications
Applications that use collections of very large, distributed datasets have become an increasingly important part of science and engineering. With high performance wide-area networ...
Michael D. Beynon, Tahsin M. Kurç, Alan Sus...
NDSS
2009
IEEE
14 years 2 months ago
SybilInfer: Detecting Sybil Nodes using Social Networks
SybilInfer is an algorithm for labelling nodes in a social network as honest users or Sybils controlled by an adversary. At the heart of SybilInfer lies a probabilistic model of h...
George Danezis, Prateek Mittal