Sciweavers

1235 search results - page 204 / 247
» Formalizing information security knowledge
Sort
View
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
14 years 8 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao
CJ
2006
117views more  CJ 2006»
13 years 7 months ago
Atomic Hypermedia
s the development of an abstract description of what there is in the world in an application-independent form. This paper argues that attempts to support information systems intero...
Duncan Martin, Helen Ashman
MOBICOM
2010
ACM
13 years 8 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
JCP
2007
121views more  JCP 2007»
13 years 7 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
ER
2007
Springer
111views Database» more  ER 2007»
14 years 1 months ago
Provability-Based Semantic Interoperability Via Translation Graphs
Provability-based semantic interoperability (PBSI) is a kind of interoperability that transcends mere syntactic translation to allow for robust, meaningful information exchange acr...
Joshua Taylor, Andrew Shilliday, Selmer Bringsjord