Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Abstract. In this paper, we present a new approach to web search personalization based on user collaboration and sharing of information about web documents. The proposed personaliz...
Users’ information needs are largely driven by the context in which they make their decisions. This context is dynamic. It includes the users’ characteristics, their current do...
Abstract—The increasing use of RFID tags in many applications have brought forth valid concerns of privacy and anonymity among users. One of the primary concerns with RFID tags i...
Murali S. Kodialam, Thyaga Nandagopal, Wing Cheong...
Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of use...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente