Sciweavers

3155 search results - page 234 / 631
» How Are You Doing
Sort
View
PERVASIVE
2007
Springer
14 years 3 months ago
Intrusive and Non-intrusive Evaluation of Ambient Displays
This paper addresses two problems: “What are the appropriate methods for evaluating information systems?” and “How do we measure the impact of ambient information systems?...
Xiaobin Shen, Peter Eades, Seok-Hee Hong, Andrew V...
PET
2007
Springer
14 years 3 months ago
Louis, Lester and Pierre: Three Protocols for Location Privacy
Abstract. Location privacy is of utmost concern for location-based services. It is the property that a person’s location is revealed to other entities, such as a service provider...
Ge Zhong, Ian Goldberg, Urs Hengartner
PKC
2007
Springer
160views Cryptology» more  PKC 2007»
14 years 3 months ago
Anonymous Signatures Made Easy
Abstract. At PKC 2006, Yang, Wong, Deng and Wang proposed the notion of anonymous signature schemes where signatures do not reveal the signer’s identity, as long as some parts of...
Marc Fischlin
PROVSEC
2007
Springer
14 years 3 months ago
On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers
Security of a modern block cipher is commonly measured in terms of its resistance to known attacks. While the provable security approach to block ciphers dates back to the first C...
Ermaliza Razali, Raphael C.-W. Phan, Marc Joye
SEKE
2007
Springer
14 years 3 months ago
A Development Platform for Distributed User Interfaces
Developing user interfaces for a heterogeneous environment is a difficult challenge. Partial distribution of the user interface is an event harder one. Specifically providing de...
Anders Larsson, Magnus Ingmarsson, Bo Sun