Sciweavers

203 search results - page 8 / 41
» Enabling Context-Aware and Privacy-Conscious User Data Shari...
Sort
View
ICMI
2003
Springer
111views Biometrics» more  ICMI 2003»
14 years 1 months ago
Distributed and local sensing techniques for face-to-face collaboration
This paper describes techniques that allow users to collaborate on tablet computers that employ distributed sensing techniques to establish a privileged connection between devices...
Ken Hinckley
ACSAC
2010
IEEE
13 years 6 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang
DBSEC
2008
196views Database» more  DBSEC 2008»
13 years 9 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay
HUC
2004
Springer
14 years 1 months ago
WatchMe: Communication and Awareness Between Members of a Closely-Knit Group
WatchMe is a personal communicator with context awareness in a wristwatch form; it is meant to keep intimate friends and family always connected via awareness cues and text, voice ...
Natalia Marmasse, Chris Schmandt, David Spectre
JSAC
2011
215views more  JSAC 2011»
13 years 2 months ago
Opportunistic Spectrum Sharing Schemes for CDMA-Based Uplink MAC in Cognitive Radio Networks
—We consider a wireless cognitive radio network in which a set of secondary users (SUs) opportunistically utilize the wireless spectrum licensed to the primary users (PUs) to tra...
Xi Zhang, Hang Su