Inicio Nosotros Búsquedas
Buscar en nuestra Base de Datos:     
Autor: Gabber, Eran (Comienzo)
2 registros cumplieron la condición especificada en la base de información BIBCYT. ()
Registro 1 de 2, Base de información BIBCYT
Publicación seriada
Referencias AnalíticasReferencias Analíticas
Autor: Gabber, Eran eran@research.bell-labs.com
Oprima aquí para enviar un correo electrónico a esta dirección ; Gibbons, Phillip B. gibbons@research.bell-labs.com
Oprima aquí para enviar un correo electrónico a esta dirección; Kristol, David M. dmk@research.bell-labs.com
Oprima aquí para enviar un correo electrónico a esta dirección; Matias, Yossi matias@math.tau.ac.il
Oprima aquí para enviar un correo electrónico a esta dirección; Mayer, Alain alain@research.bell-labs.com
Oprima aquí para enviar un correo electrónico a esta dirección
Título: Consistent, Yet Anonymous, Web Access with LPWA.
Páginas/Colación: pp.42-47; 28 cm.il.
Communications of the ACM Vol. 42, no. 2 February 1999
Información de existenciaInformación de existencia

Resumen
The article describes the Lucent Personalized Web Assistant (LPWA), a software system designed to address Internet users' concerns. Users may browse the Web in a personalized, simple, private and secure fashion using LPWA-generated aliases and other LPWA features. LPWA generates secure, consistent, and pseudonymous aliases for Web users. Each alias consists of an alias username, an alias password and an alias email address. The alias email addresses allow Web sites to send messages to users and enable effective spam filtering. LPWA forwards mail addressed to the alias email address to the actual user. LPWA allows users to filter incoming messages based on the recipient address, which is an effective method for detecting and blocking spam. In this way, the LPWA site does not attract break-ins, and the LPWA service may be replicated easily. The absence of state information also implies there are no records to which an outside agency can demand access. INSET: Usage of LPWA.

Registro 2 de 2, Base de información BIBCYT
Publicación seriada
Referencias AnalíticasReferencias Analíticas
Autor: Gabber, Eran eran@research.bell-labs.com
Oprima aquí para enviar un correo electrónico a esta dirección ; Wool , Avishai
Título: On location-restricted services
Páginas/Colación: pp. 44-52
IEEE Network Vol. 13, no. 6 Nov/Dec 1999
Información de existenciaInformación de existencia

Palabras Claves: Palabras: DIRECTION OF ARRIVAL (DOA) ESTIMATION DIRECTION OF ARRIVAL (DOA) ESTIMATION, Palabras: RADIONAVIGATION AND DIRECTION FINDING RADIONAVIGATION AND DIRECTION FINDING

Resumen
Monitoring the location of user equipment is an important problem in many industries, including direct broadcasting satellites and others, where the physical location of the user determines the availability of the service or is crucial for the security o

Monitoring the location of user equipment is an important problem in many industries, including direct broadcasting satellites and others, where the physical location of the user determines the availability of the service or is crucial for the security or operation of the service. In this article we study four schemes for detecting the movement of user equipment, such as a set-top terminal, wireless local loop (fixed wireless) phones, and other "nonmovable" equipment, using existing (or emerging) communication infrastructures. The first two schemes are network-centric, which means that the network infrastructure determines the location. The two other schemes are terminal-centric, which means that they rely on the user's device. We start with the currently used scheme, which is based on the telephone network's caller ID features, and show how it can be undermined. Then we describe three more robust schemes: one that uses the cellular phone's enhanced 911 service, one that uses the Global Positioning System, and one that measures the time-difference-of-arrival of the satellite's broadcast. We discuss the accuracy, features, and vulnerabilities of each scheme. We also present possible attacks on these schemes that allow the attackers to conceal their movement, and evaluate the complexity and cost of the attacks.

 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

UCLA - Biblioteca de Ciencias y Tecnologia Felix Morales Bueno

Generados por el servidor 'bibcyt.ucla.edu.ve' (3.145.94.243)
Adaptive Server Anywhere (07.00.0000)
ODBC
Sesión="" Sesión anterior=""
ejecutando Back-end Alejandría BE 7.0.7b0 ** * *
3.145.94.243 (NTM) bajo el ambiente Apache/2.2.4 (Win32) PHP/5.2.2.
usando una conexión ODBC (RowCount) al manejador de bases de datos..
Versión de la base de información BIBCYT: 7.0.0 (con listas invertidas [2.0])

Cliente: 3.145.94.243
Salida con Javascript


** Back-end Alejandría BE 7.0.7b0 *