Kaminsky

Results: 130



#Item
61Reputation management / Sybil attack / Distributed hash table / Connectivity / Mathematics / Computing / Structure / Kademlia / Small world routing / Distributed data storage / Network theory / Networks

SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks Haifeng Yu National University of Singapore Michael Kaminsky Intel Research Pittsburgh

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2008-03-09 22:59:33
62Reputation management / Sybil attack / Distributed hash table / Connectivity / Mathematics / Computing / Electronics / Kademlia / Small world routing / Distributed data storage / Networks / Network theory

SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks Haifeng Yu National University of Singapore Michael Kaminsky Intel Research Pittsburgh

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-07-13 06:52:18
63Sybil attack / Public-key cryptography / Information society / Collective intelligence / Consensus / Sybil / Digg / Electronic voting / Social information processing / Collaboration / Reputation system

DSybil: Optimal Sybil-Resistance for Recommendation Systems Haifeng Yu∗ , Chenwei Shi† , Michael Kaminsky‡ , Phillip B. Gibbons§ and Feng Xiao¶ ∗ School of Computing, National University of Singapore, Singapore

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-03-07 00:15:58
64Computer-mediated communication / Computing / Anti-spam techniques / Email spam / Whitelist / Greylisting / Sender Policy Framework / Simple Mail Transfer Protocol / Challenge–response spam filtering / Spam filtering / Spamming / Email

R E : Reliable Email Scott Garriss† , Michael Kaminsky∗ Michael J. Freedman‡◦ , Brad Karp∗∗ , David Mazières◦ , Haifeng Yu∗† † Carnegie Mellon University, ∗ Intel Research Pittsburgh, ‡ New York

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2006-11-02 03:27:54
65Sybil attack / Reputation system / Information society / Consensus / Collective intelligence / Sybil / Public-key cryptography / Digg / Social information processing / Collaboration / Reputation management

DSybil: Optimal Sybil-Resistance for Recommendation Systems Haifeng Yu∗ , Chenwei Shi† , Michael Kaminsky‡ , Phillip B. Gibbons§ and Feng Xiao¶ ∗ School of Computing, National University of Singapore, Singapore

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-04-09 06:30:09
66Cryptographic protocols / X.509 / Certificate authority / PKCS / Public key certificate / HTTP Secure / Dan Kaminsky / Root certificate / Basic Encoding Rules / Cryptography / Public-key cryptography / Key management

PKI Layer Cake: New Collision Attacks Against the Global X.509 Infrastructure Dan Kaminsky1 , Meredith L. Patterson, and Len Sassaman2 1 2

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
67Hashing / Computing / Search algorithms / MD5 / HMAC / Crypt / Collision attack / SHA-1 / Md5sum / Error detection and correction / Cryptography / Cryptographic hash functions

1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-06 19:52:41
68Computer-mediated communication / Computing / Anti-spam techniques / Email spam / Whitelist / Greylisting / Sender Policy Framework / Simple Mail Transfer Protocol / Challenge–response spam filtering / Spam filtering / Spamming / Email

R E : Reliable Email Scott Garriss† , Michael Kaminsky∗ Michael J. Freedman‡◦ , Brad Karp∗∗ , David Mazières◦ , Haifeng Yu∗† † Carnegie Mellon University, ∗ Intel Research Pittsburgh, ‡ New York

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2006-03-30 16:59:43
69Europe / Law and Justice / National Revival of Poland / David Cameron / Jedwabne / Michael Schudrich / Kaminsky / Denis MacShane / Jews and Judaism in Europe / Politics of Europe / Michał Kamiński / Politics

PRINT New Statesman

Add to Reading List

Source URL: www.nigdywiecej.org

Language: English - Date: 2009-12-08 08:04:14
70Information retrieval / Artificial intelligence / Bloom filter / Cuckoo hashing / Hash table / Hash function / Perfect hash function / Trie / Lookup table / Hashing / Search algorithms / Information science

Cuckoo Filter: Practically Better Than Bloom Bin Fan, David G. Andersen, Michael Kaminsky† , Michael D. Mitzenmacher‡ Carnegie Mellon University, † Intel Labs, ‡ Harvard University {binfan,dga}@cs.cmu.edu, michae

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2015-01-22 13:21:08
UPDATE