Sciweavers

818 search results - page 86 / 164
» An Internet Voting System Supporting User Privacy
Sort
View
HIPEAC
2005
Springer
14 years 2 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
SEMWEB
2007
Springer
14 years 3 months ago
Web Search Personalization Via Social Bookmarking and Tagging
Abstract. In this paper, we present a new approach to web search personalization based on user collaboration and sharing of information about web documents. The proposed personaliz...
Michael G. Noll, Christoph Meinel
AH
2004
Springer
14 years 2 months ago
Myriad: An Architecture for Contextualized Information Retrieval and Delivery
Users’ information needs are largely driven by the context in which they make their decisions. This context is dynamic. It includes the users’ characteristics, their current do...
Cécile Paris, Mingfang Wu, Keith Vander Lin...
INFOCOM
2007
IEEE
14 years 3 months ago
Anonymous Tracking Using RFID Tags
Abstract—The increasing use of RFID tags in many applications have brought forth valid concerns of privacy and anonymity among users. One of the primary concerns with RFID tags i...
Murali S. Kodialam, Thyaga Nandagopal, Wing Cheong...
PKC
2009
Springer
140views Cryptology» more  PKC 2009»
14 years 9 months ago
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of use...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente