Search Results

You are looking at 1 - 4 of 4 items for :

  • sustainability x
  • IT-Security and Cryptology x
Clear All
Open access

Niklas Buescher, Spyros Boukoros, Stefan Bauregger and Stefan Katzenbeisser

,” IEEE Std 100-2000 , pp. 1–1362, Dec 2000. [31] J. Z. Kolter and M. J. Johnson, “Redd: A public data set for energy disaggregation research,” in Workshop on Data Mining Applications in Sustainability (SIGKDD), San Diego, CA , vol. 25, pp. 59–62, Citeseer, 2011. [32] P. S. Inc., “Dataport Dataset.” https://dataport.pecanstreet.org/ . [Online; accessed July-2016]. [33] S. Makonin, B. Ellert, I. V. Bajic, and F. Popowich, “Electricity, water, and natural gas consumption of a residential house in Canada from 2012 to 2014,” Scientific Data , vol. 3, no

Open access

Linda Lee, David Fifield, Nathan Malkin, Ganesh Iyer, Serge Egelman and David Wagner

empirical study of the effectiveness of web browser phishing warnings. In SIGCHI Conference on Human Factors in Computing Systems , pages 1065–1074. ACM, 2008. [16] S. Egelman, D. Molnar, N. Christin, A. Acquisti, C. Herley, and S. Krishnamurthi. Please continue to hold. In Ninth Workshop on the Economics of Information Security , 2010. [17] B. Fabian, F. Goertz, S. Kunz, S. Müller, and M. Nitzsche. Privately waiting: A usability analysis of the Tor anonymity network. In Sustainable e-Business Management , Lecture Notes in Business Information Processing 58

Open access

Alexandros Mittos, Bradley Malin and Emiliano De Cristofaro

. R. Foster, M. W. Fried, C. Hezode, G. M. Hirschfield, I. Jacobson, I. Nikitin, et al. Simeprevir increases rate of sustained virologic response among treatment-experienced patients with hcv genotype-1 infection: a phase iib trial. Gastroenterology , 146(2):430–441, 2014. [ZDJ + 15] Y. Zhang, W. Dai, X. Jiang, H. Xiong, and S. Wang. FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption. BMC Medical Informatics and Decision Making , 15(5):S5, 2015. [ZDN18] ZDNet. IBM Warns Of Instant Breaking of Encryption by Quantum Computers

Open access

Carmela Troncoso, Marios Isaakidis, George Danezis and Harry Halpin

. Sybil-Limit: A near-optimal social network defense against Sybil attacks. IEEE/ACM Trans. Netw. , 2010. [182] H. Yu, P. B. Gibbons, and C. Shi. DCast: sustaining collaboration in overlay multicast despite rational collusion. In 19th ACM Conference on Computer and Communications Security , 2012. [183] D. J. Zage and C. Nita-Rotaru. On the accuracy of decentralized virtual coordinate systems in adversarial networks. In 14th ACM Conference on Computer and Communications Security , 2007. [184] E. Zhai, R. Chen, Z. Cai, L. Zhang, E. K. Lua, H. Sun, S