Sciweavers

203 search results - page 29 / 41
» Enabling Context-Aware and Privacy-Conscious User Data Shari...
Sort
View
ASIACRYPT
2000
Springer
14 years 6 days ago
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
Rather than use a shared key directly to cryptographically process (e.g. encrypt or authenticate) data one can use it as a master key to derive subkeys, and use the subkeys for the...
Michel Abdalla, Mihir Bellare
JASIS
2011
98views more  JASIS 2011»
13 years 2 months ago
Hip and trendy: Characterizing emerging trends on Twitter
Twitter, Facebook, and other related systems that we call social awareness streams are rapidly changing the information and communication dynamics of our society. These systems, w...
Mor Naaman, Hila Becker, Luis Gravano
SEMWEB
2009
Springer
14 years 2 months ago
Policy-Aware Content Reuse on the Web
The Web allows users to share their work very effectively leading to the rapid re-use and remixing of content on the Web including text, images, and videos. Scientific research d...
Oshani Seneviratne, Lalana Kagal, Tim Berners-Lee
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
14 years 8 months ago
Mining social networks for personalized email prioritization
Email is one of the most prevalent communication tools today, and solving the email overload problem is pressingly urgent. A good way to alleviate email overload is to automatical...
Shinjae Yoo, Yiming Yang, Frank Lin, Il-Chul Moon
FAST
2010
13 years 10 months ago
Provenance for the Cloud
The cloud is poised to become the next computing environment for both data storage and computation due to its pay-as-you-go and provision-as-you-go models. Cloud storage is alread...
Kiran-Kumar Muniswamy-Reddy, Peter Macko, Margo I....