Sciweavers

128
Voted
CONEXT
2008
ACM
15 years 6 months ago
Power-law chord architecture in P2P overlays
In this paper, we propose to extend the topology of Chord to a bidirectional graph to provide a super-peer based lookup algorithm and an efficient resource localization service at...
Salma Ktari, Artur Hecker, Houda Labiod
173
Voted
TRUSTBUS
2005
Springer
15 years 10 months ago
Protection Mechanisms Against Phishing Attacks
Abstract. Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probabi...
Klaus Plößl, Hannes Federrath, Thomas N...