Discrepancy Detection in Whole Network Provenance. | 0 | 0.34 | 2020 |
Rationality-proof consensus: extended abstract. | 0 | 0.34 | 2018 |
Inclusive persuasion for security software adoption. | 0 | 0.34 | 2017 |
Perceived Risk and Self-Efficacy Regarding Internet Security in a Marginalized Community. | 0 | 0.34 | 2015 |
Interactive Website Filter for Safe Web Browsing. | 2 | 0.39 | 2013 |
ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks. | 5 | 1.01 | 2010 |
You're Not Who You Claim to Be: Website Identity Check for Phishing Detection | 2 | 0.38 | 2010 |
k-ARQ: k-anonymous ranking queries | 0 | 0.34 | 2010 |
An efficient and scalable algorithm for policy compatibility in service virtualization | 0 | 0.34 | 2009 |
BayeShield: conversational anti-phishing user interface | 1 | 0.35 | 2009 |
A targeted web crawling for building malicious javascript collection | 6 | 0.50 | 2009 |
Obfuscated malicious javascript detection using classification techniques. | 53 | 3.32 | 2009 |
B-APT: Bayesian Anti-Phishing Toolbar | 17 | 0.82 | 2008 |
An efficient LKH tree balancing algorithm for group key management | 8 | 0.63 | 2006 |
An efficient key tree management algorithm for LKH group key management | 1 | 0.42 | 2006 |
Rating Certificates. | 0 | 0.34 | 2006 |
Key bundles and parcels: secure communication in many groups | 4 | 0.44 | 2006 |
Stabilizing Certificate Dispersal. | 4 | 0.43 | 2006 |
Optimal Dispersal of Certificate Chains | 8 | 0.56 | 2004 |
Certificate Dispersal in Ad-Hoc Networks | 13 | 0.74 | 2004 |
Optimal dispersal of special certificate graphs | 1 | 0.36 | 2004 |
On the fast shape recovery technique using multiple ring lights | 0 | 0.34 | 1997 |