On key issuing privacy in distributed online social networks | 0 | 0.34 | 2012 |
Enforcing Relaxed Declassifications with Reference Points | 0 | 0.34 | 2011 |
A new enforcement on declassification with reachability analysis | 3 | 0.39 | 2011 |
Phagocytes: A Holistic Defense and Protection Against Active P2P Worms | 1 | 0.37 | 2011 |
Secure Information Flow by Model Checking Pushdown System | 10 | 0.63 | 2010 |
Automatic Data Extraction from Web Discussion Forums | 3 | 0.46 | 2009 |
Sorcery: Could we make P2P content sharing systems robust to deceivers? | 4 | 0.42 | 2009 |
Hybrid Overlay Structure Based on Virtual Node | 1 | 0.43 | 2007 |
An economical model for the risk evaluation of DoS vulnerabilities in cryptography protocols | 1 | 0.36 | 2007 |