Sciweavers

729 search results - page 113 / 146
» Towards Secure e-Services
Sort
View
IFIP
2009
Springer
14 years 2 months ago
Detecting Spam at the Network Level
Spam is increasingly a core problem affecting network security and performance. Indeed, it has been estimated that 80% of all email messages are spam. Content-based filters are a ...
Anna Sperotto, Gert Vliek, Ramin Sadre, Aiko Pras
ICC
2007
IEEE
245views Communications» more  ICC 2007»
14 years 2 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
LPAR
2007
Springer
14 years 2 months ago
Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap
Operational models of (security) protocols, on one hand, are readable and conveniently match their implementation (at a certain abstraction level). Epistemic models, on the other h...
Francien Dechesne, Mohammad Reza Mousavi, Simona O...
ICMCS
2006
IEEE
151views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Conditional Access to H.264/AVC Video with Drift Control
In this paper we address the problem of providing conditional access to video sequences, namely, to generate a low-quality video to be used as preview, which can be decoded at ful...
Enrico Magli, Marco Grangetto, Gabriella Olmo
NOSSDAV
2005
Springer
14 years 1 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...