Sciweavers

818 search results - page 108 / 164
» An Internet Voting System Supporting User Privacy
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
WWW
2003
ACM
14 years 9 months ago
Xspect: bridging open hypermedia and XLink
This paper evaluates the XLink format in comparison with other linking formats. The comparison is based on Xspect, an implementation of XLink. Xspect handles transformation betwee...
Bent Guldbjerg Christensen, Frank Allan Hansen, Ni...
WWW
2009
ACM
14 years 9 months ago
Efficient interactive fuzzy keyword search
Traditional information systems return answers after a user submits a complete query. Users often feel "left in the dark" when they have limited knowledge about the unde...
Shengyue Ji, Guoliang Li, Chen Li, Jianhua Feng
CCS
2009
ACM
14 years 3 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
WWW
2008
ACM
14 years 9 months ago
Learning transportation mode from raw gps data for geographic applications on the web
Geographic information has spawned many novel Web applications where global positioning system (GPS) plays important roles in bridging the applications and end users. Learning kno...
Yu Zheng, Like Liu, Longhao Wang, Xing Xie