메뉴 건너뛰기




Volumn , Issue , 2007, Pages 240-248

Addressing click fraud in content delivery systems

Author keywords

[No Author keywords available]

Indexed keywords

CONTENT BASED RETRIEVAL; NETWORK PROTOCOLS; NETWORK SECURITY;

EID: 34548364250     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2007.36     Document Type: Conference Paper
Times cited : (15)

References (24)
  • 1
    • 34548353664 scopus 로고    scopus 로고
    • Google click fraud, http://www.law.com/jsp/article.jsp?id=1153213525657.
    • Google click fraud
  • 2
    • 34548332202 scopus 로고    scopus 로고
    • Msnbc dataset, http://kdd.ics.uci.edu/databases/msnbc/msnbc.html.
    • Msnbc dataset
  • 5
    • 0000416796 scopus 로고    scopus 로고
    • Optimistic fair exchange of digital signatures
    • N. Asokan and V. Shoup. Optimistic fair exchange of digital signatures. EUROCRYPT '98, 1998.
    • (1998) EUROCRYPT '98
    • Asokan, N.1    Shoup, V.2
  • 7
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 10
    • 14844283355 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. Crypto 2003.
    • Crypto 2003
    • Camenisch, J.1    Shoup, V.2
  • 11
    • 0002391080 scopus 로고
    • Untraceable electronic cash)
    • D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash). CRYPTO '88, pp. 319-327., 1989.
    • (1989) CRYPTO '88 , pp. 319-327
    • Chaum, D.1    Fiat, A.2    Naor, M.3
  • 12
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. LNCS, 1462, 1998.
    • (1998) LNCS , vol.1462
    • Cramer, R.1    Shoup, V.2
  • 13
    • 34250668863 scopus 로고    scopus 로고
    • Approximately detecting duplicates for streaming data using stable bloom filters
    • F. Deng and D. Rafiei. Approximately detecting duplicates for streaming data using stable bloom filters. In ACM SIGMOD'06.
    • ACM SIGMOD'06
    • Deng, F.1    Rafiei, D.2
  • 14
    • 0000097412 scopus 로고    scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Crypto '86.
    • Crypto '86
    • Fiat, A.1    Shamir, A.2
  • 16
    • 84944906479 scopus 로고    scopus 로고
    • Secure and efficient off-line digital money
    • London, UK. Springer-Verlag
    • M. K. Franklin and M. Yung. Secure and efficient off-line digital money. In ICALP '93, pages 265-276, London, UK. Springer-Verlag.
    • ICALP '93 , pp. 265-276
    • Franklin, M.K.1    Yung, M.2
  • 17
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17, 1988.
    • (1988) SIAM Journal on Computing , vol.17
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 18
  • 19
    • 0000901529 scopus 로고    scopus 로고
    • Security arguments for digital signatures and blind signatures
    • D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13, 2000.
    • (2000) Journal of Cryptology , vol.13
    • Pointcheval, D.1    Stern, J.2
  • 20
    • 0002360237 scopus 로고    scopus 로고
    • Non-interactive zero-knowledge proofs of knowledge and chosen-ciphertext attack
    • C. Rackoff and D. Simon. Non-interactive zero-knowledge proofs of knowledge and chosen-ciphertext attack. LNCS, CRYPTO 91.
    • LNCS, CRYPTO 91
    • Rackoff, C.1    Simon, D.2
  • 22
    • 34548360945 scopus 로고
    • Cryptography: Theory and practice
    • D. R. Stinson. Cryptography: theory and practice. CRC Press, 1995.
    • (1995) CRC Press
    • Stinson, D.R.1
  • 23
    • 34548371522 scopus 로고    scopus 로고
    • Pricing in publish/subscribe systems
    • A. Tanner and M. A. Jaeger. Pricing in publish/subscribe systems. In ICEC '04.
    • ICEC '04
    • Tanner, A.1    Jaeger, M.A.2
  • 24
    • 84929315070 scopus 로고    scopus 로고
    • Security issues and requirements for internet-scale publish-subscribe systems
    • C. Wang, A. Carzaniga, D. Evans, and A. Wolf. Security issues and requirements for internet-scale publish-subscribe systems. In HICSS'02.
    • HICSS'02
    • Wang, C.1    Carzaniga, A.2    Evans, D.3    Wolf, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.