Sciweavers

17505 search results - page 3493 / 3501
» Use Cases as Workflows
Sort
View
145
Voted
ARESEC
2011
117views more  ARESEC 2011»
14 years 3 months ago
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
Yves Igor Jerschow, Martin Mauve
145
Voted
ATAL
2011
Springer
14 years 3 months ago
Commitments with regulations: reasoning about safety and control in REGULA
Commitments provide a flexible means for specifying the business relationships among autonomous and heterogeneous agents, and lead to a natural way of enacting such relationships...
Elisa Marengo, Matteo Baldoni, Cristina Baroglio, ...
143
Voted
CCS
2011
ACM
14 years 3 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King
240
Voted
COSIT
2011
Springer
269views GIS» more  COSIT 2011»
14 years 3 months ago
Analyzing the Spatial-Semantic Interaction of Points of Interest in Volunteered Geographic Information
With the increasing success and commercial integration of Volunteered Geographic Information (VGI), the focus shifts away from coverage to data quality and homogeneity. Within the ...
Christoph Mülligann, Krzysztof Janowicz, Mao ...
134
Voted
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
« Prev « First page 3493 / 3501 Last » Next »