Sciweavers

1708 search results - page 197 / 342
» Associative personal information management
Sort
View
UCS
2007
Springer
14 years 4 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
ICDE
1999
IEEE
184views Database» more  ICDE 1999»
14 years 11 months ago
Document Warehousing Based on a Multimedia Database System
Nowadays, structured data such as sales and business forms are stored in data warehouses for decision makers to use. Further, unstructured data such as emails, html texts, images,...
Hiroshi Ishikawa, Kazumi Kubota, Yasuo Noguchi, Ko...
CHI
2007
ACM
14 years 10 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
PERCOM
2007
ACM
14 years 10 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
CHI
2010
ACM
14 years 5 months ago
Cleanly: trashducation urban system
Half the world’s population is expected to live in urban areas by 2020. The high human density and changes in peoples’ consumption habits result in an everincreasing amount of...
Inbal Reif, Florian Alt, Juan David Hincapié...