-
2
-
-
35148896115
-
"ExOR: Opportunistic Multi-Hop Routing for Wireless Networks
-
Philadephia
-
Biswas, S. and R. Morris, "ExOR: Opportunistic Multi-Hop Routing for Wireless Networks," Proceedings of ACM SIGCOMM ?05, Philadephia, 2005
-
(2005)
Proceedings of ACM SIGCOMM ?05
-
-
Biswas, S.1
Morris, R.2
-
5
-
-
59349108869
-
Pride: Peer-To-Peer Reputation Infrastructure for Decentralized Environments
-
ACM Press, New York, NY, USA, May 19-21
-
Dewan, P. and Dasgupta, P., "Pride: Peer-To-Peer Reputation Infrastructure for Decentralized Environments," Proceedings of the 13th International World Wide Web Conference on Alternate Track Papers & Posters, pp. 480-481, ACM Press, New York, NY, USA, May 19-21, 2004
-
(2004)
Proceedings of the 13th International World Wide Web Conference on Alternate Track Papers & Posters
, pp. 480-481
-
-
Dewan, P.1
Dasgupta, P.2
-
11
-
-
80055028343
-
Sender ID Framework ?
-
Microsoft Corporation, Executive Overview
-
Microsoft Corporation, Sender ID Framework ? Executive Overview, 2004
-
(2004)
-
-
-
13
-
-
84904786626
-
SIDF and DKIM overview Scorecard
-
Peterson, Patrick, "SIDF and DKIM overview Scorecard," Authentication Summit II, 2006, http:// www.aotalliance.org/summit-Archive/pdfs/2-Summit-Scorecard-final.pdf
-
(2006)
Authentication Summit II
-
-
Peterson, Patrick1
-
17
-
-
3543125831
-
-
Mail Abuse Prevention System LLC, California
-
Realtime Blackhole List, Mail Abuse Prevention System LLC, California, 2002, http://www.mailabuse. org/rbl/
-
(2002)
Realtime Blackhole List
-
-
-
20
-
-
33646831908
-
TrustGuard: Countering Vulnerabilities in Reputation Management for Decentralized Networks
-
Japan
-
Srivatsa, M., L. Xiong, L. Liu, "TrustGuard: Countering Vulnerabilities in Reputation Management for Decentralized Networks," 14th World Wide Web Conference (WWW 2005), Japan, 2005
-
(2005)
14th World Wide Web Conference (WWW 2005)
-
-
Srivatsa, M.1
Xiong, L.2
Liu, L.3
-
21
-
-
85094319307
-
Accountable Email: Building on Authentication
-
Jordan, Stephanie, Matt Blumberg, Des Cahill, Richard Gingras, "Accountable Email: Building on Authentication," Authentication Summit II, 2006, http://www.aotalliance.org/summit-Archive/ pdfs/7-building-on-Authentication.pdf
-
(2006)
Authentication Summit II
-
-
Jordan, Stephanie1
Blumberg, Matt2
Cahill, Des3
Gingras, Richard4
-
25
-
-
1142293052
-
Detecting Deception in Reputation Management,"
-
Melbourne, ACM Press
-
Yu, Bin and Munindar P. Singh, "Detecting Deception in Reputation Management," Proceedings of the 2nd International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS), Melbourne, ACM Press, 2003
-
(2003)
Proceedings of the 2nd International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS)
-
-
Yu, Bin1
Singh, Munindar P.2
-
26
-
-
35548992569
-
Defending Against Sybil Attacks via Social Networks
-
Yu, H., M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, "Defending Against Sybil Attacks via Social Networks," Proceedings of ACM SIGCOMM Conference, 2006
-
(2006)
Proceedings of ACM SIGCOMM Conference
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P. B.3
Flaxman, A. D.4
|