Sciweavers

1323 search results - page 172 / 265
» Updatable Security Views
Sort
View
SIGCOMM
2010
ACM
15 years 2 months ago
NetFence: preventing internet denial of service from inside out
Denial of Service (DoS) attacks frequently happen on the Internet, paralyzing Internet services and causing millions of dollars of financial loss. This work presents NetFence, a s...
Xin Liu, Xiaowei Yang, Yong Xia
127
Voted
ACSAC
2010
IEEE
14 years 12 months ago
Who is tweeting on Twitter: human, bot, or cyborg?
Twitter is a new web application playing dual roles of online social networking and micro-blogging. Users communicate with each other by publishing text-based posts. The popularit...
Zi Chu, Steven Gianvecchio, Haining Wang, Sushil J...
SI3D
2003
ACM
15 years 7 months ago
Large haptic topographic maps: marsview and the proxy graph algorithm
In this paper we develop an interactive 3D browser for large topographic maps using a visual display augmented by a haptic, or force feedback, display. The extreme size of our dat...
Sean P. Walker, John Kenneth Salisbury Jr.
98
Voted
CCS
2010
ACM
15 years 9 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
EUROCRYPT
2003
Springer
15 years 7 months ago
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
ded abstract of this paper appears in Advances in Cryptology – EUROCRYPT ’03, Lecture Notes in Computer Science Vol. 2656, E. Biham ed., Springer-Verlag, 2003. This is the full...
Mihir Bellare, Tadayoshi Kohno