Sciweavers

343 search results - page 42 / 69
» The All-In Publication Policy
Sort
View
LISA
2003
14 years 8 days ago
DryDock: A Document Firewall
Auditing a web site’s content is an arduous task. For any given page on a web server, system administrators are often ill-equipped to determine who created the document, why itâ...
Deepak Giridharagopal
INFOCOM
2010
IEEE
13 years 9 months ago
BitTorrent Darknets
Abstract—A private BitTorrent site (also known as a “BitTorrent darknet”) is a collection of torrents that can only be accessed by members of the darknet community. The priva...
Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu, ...
JCS
2010
104views more  JCS 2010»
13 years 9 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
INFOCOM
2008
IEEE
14 years 5 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 4 months ago
Creating a Scenariologic - Design and Application of a Repeatable Methodology
Context scenarios are widely used for assessing the robustness of strategies and policies in both the private and the public sector. Royal Dutch Shell, for instance, has become re...
Bert Enserink