Abstract

Results: 68258



#Item
201Technology / Terms of service / Social networking services / Digital media / Law / Internet privacy / Children's Online Privacy Protection Act / Social networks / Privacy / World Wide Web / Computer network / Privacy concerns with social networking services

Area 3 (Security and Privacy) Danny Yoo () Abstract Imagine you are designing a Web-based system that enables sharing and communication between users who are as young as ten years of age. What are the secu

Add to Reading List

Source URL: www.hashcollision.org

Language: English
202Computing / Internet privacy / Software / Technology / Internet censorship / Text messaging / Email / Internet censorship circumvention / Freenet / Deep packet inspection / Steganography / SMS

Chipping Away at Censorship Firewalls with User-Generated Content Sam Burnett, Nick Feamster, and Santosh Vempala School of Computer Science, Georgia Tech {sburnett, feamster, vempala}@cc.gatech.edu Abstract

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2010-06-03 17:05:03
203Group theory / Geometry / Abstract algebra / Geometric group theory / Topological groups / Amenable group / Kazhdan's property / Quasi-isometry / Unitary representation / Haagerup property / Compactly generated group / Gelfand pair

Isometric group actions on Hilbert spaces: growth of cocycles Yves de Cornulier, Romain Tessera, Alain Valette November 12, 2006 Abstract We study growth of 1-cocycles of locally compact groups, with values in

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2006-11-13 16:01:01
204Domain name system / Internet / Cryptography / Computing / Domain Name System Security Extensions / Sender Policy Framework / DNS-based Authentication of Named Entities / DMARC / Name server / Extension mechanisms for DNS / DNS root zone / Email authentication

Short Paper: On Deployment of DNS-based Security Enhancements Pawel Szalachowski and Adrian Perrig ETH Zurich, Switzerland Abstract. Although the Domain Name System (DNS) was designed as a naming

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
205Mobile technology / Technology / Data mining / Wireless / Mobile telecommunications / Videotelephony / Anomaly detection / Data security / Machine learning / Local outlier factor / Computer network / UMTS

Visual Analytics for enhancing supervised attack attribution in mobile networks∗ Stavros Papadopoulos, Vasilios Mavroudis, Anastasios Drosou, and Dimitrios Tzovaras Abstract Researchers have recently uncovered numerous

Add to Reading List

Source URL: mavroud.is

Language: English - Date: 2018-10-23 09:34:50
206Cryptography / Zero-knowledge proof / Proof of knowledge / Malleability / Mathematical proof / Non-interactive zero-knowledge proof / Ciphertext indistinguishability / Homomorphic encryption / FiatShamir heuristic

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
207Theoretical computer science / Software engineering / Mathematical software / Formal methods / Logic in computer science / Proof assistants / Automated theorem proving / Automated reasoning / Satisfiability modulo theories / E theorem prover / ACL2 / Isabelle

Making Automatic Theorem Provers more Versatile Simon Cruanes University of Lorraine, CNRS, Inria, LORIA, 54000 Nancy, France Abstract We argue that automatic theorem provers should become more versatile and should be ab

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2017-08-01 10:52:10
208Geometry / Mathematics / Space / Metric geometry / Hyperbolic geometry / Geometric group theory / -hyperbolic space / Hyperbolic group / Geodesic / Differential geometry of surfaces / Busemann function / Hyperbolic metric space

FIRST PASSAGE PERCOLATION ON A HYPERBOLIC GRAPH ADMITS BI-INFINITE GEODESICS ITAI BENJAMINI AND ROMAIN TESSERA Abstract. Given an infinite connected graph, a way to randomly perturb its metric is to assign random i.i.d.

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-12-08 04:38:11
209Algebraic geometry / Geometry / Algebra / Algebraic surfaces / Birational geometry / Algebraic curves / Abelian varieties / K3 surface / Projective variety / EnriquesKodaira classification / Ample line bundle / Enriques surface

¨ HYPERKAHLER MANIFOLDS OLIVIER DEBARRE Abstract. The aim of these notes is to acquaint the reader with important objects in complex

Add to Reading List

Source URL: www.math.ens.fr

Language: English - Date: 2018-10-04 04:14:37
UPDATE