Sciweavers

243 search results - page 34 / 49
» Addressing privacy issues in CardSpace
Sort
View
WIMOB
2008
IEEE
14 years 2 months ago
VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking
—Recently, mobile social software has become an active area of research and development. A multitude of systems have been proposed over the past years that try to follow the succ...
Marco von Arb, Matthias Bader, Michael Kuhn 0002, ...
IJIEM
2010
171views more  IJIEM 2010»
13 years 6 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
FC
2009
Springer
93views Cryptology» more  FC 2009»
14 years 2 months ago
Coercion Resistant End-to-end Voting
End-to-end voting schemes have shown considerable promise for allowing voters to verify that tallies are accurate. At the same time, the threat of coercion has generally been consi...
Ryan W. Gardner, Sujata Garera, Aviel D. Rubin
WMCSA
2008
IEEE
14 years 2 months ago
Location-based trust for mobile user-generated content: applications, challenges and implementations
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundam...
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang,...
ITNG
2007
IEEE
14 years 2 months ago
Human Computer Interaction Based Intrusion Detection
—In this paper we survey the state of the art in direct and indirect human computer interaction based biometrics. Direct HCI biometrics are based on abilities, style, preference,...
Roman V. Yampolskiy