Sciweavers

3509 search results - page 12 / 702
» Yours, Mine and Ours
Sort
View
CRYPTO
1998
Springer
109views Cryptology» more  CRYPTO 1998»
13 years 12 months ago
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
We introduce delegation schemes wherein a user may delegate certain rights to himself, but may not safely delegate these rights to others. In our motivating application, a user ha...
Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest
USS
2008
13 years 10 months ago
All Your iFRAMEs Point to Us
As the web continues to play an ever increasing role in information exchange, so too is it becoming the prevailing platform for infecting vulnerable hosts. In this paper, we provi...
Niels Provos, Panayiotis Mavrommatis, Moheeb Abu R...
CEAS
2008
Springer
13 years 9 months ago
Global-scale Anti-spam Testing in Your Own Back Yard
The effectiveness of anti-spam techniques is an important question: after all, spam has a real cost to legitimate users in terms of time and resources. The problem is how we deter...
Margaret Nielsen, Dane Bertram, Sampson Pun, John ...
AAAI
2010
13 years 9 months ago
How Incomplete Is Your Semantic Web Reasoner?
Conjunctive query answering is a key reasoning service for many ontology-based applications. In order to improve scalability, many Semantic Web query answering systems give up com...
Giorgos Stoilos, Bernardo Cuenca Grau, Ian Horrock...
ECIS
2003
13 years 9 months ago
Do you know your terms? - A procedure model for terminology management
Due to the extensive development und use of information technology, a lot of companies gained access to vast internal and external information sources. Yet nonetheless, efficiency...
Stefan Kremer, Lutz Kolbe, Walter Brenner