Sciweavers

16160 search results - page 133 / 3232
» How to approach humans
Sort
View
COLCOM
2008
IEEE
14 years 2 months ago
Collaborative Search and User Privacy: How Can They Be Reconciled?
Abstract. Collaborative search engines (CSE) let users pool their resources and share their experiences when seeking information on the web. However, when shared, search terms and ...
Thorben Burghardt, Erik Buchmann, Klemens Böh...
BLISS
2007
IEEE
14 years 2 months ago
Evolving the Face of a Criminal: How to Search a Face Space More Effectively
Witnesses and victims of serious crime are often required to construct a facial composite, a visual likeness of a suspect’s face. The traditional method is for them to select in...
Charlie D. Frowd, Vicki Bruce, Carol Gannon, Mark ...
IEEEARES
2007
IEEE
14 years 2 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
IPCCC
2007
IEEE
14 years 2 months ago
First Responders' Crystal Ball: How to Scry the Emergency from a Remote Vehicle
Successes and failures during rescue operations after hurricane Katrina and the Twin Towers attack demonstrated the importance of supporting first responders with adequate means t...
Marco Roccetti, Mario Gerla, Claudio E. Palazzi, S...
ASIACRYPT
2007
Springer
14 years 2 months ago
How to Build a Hash Function from Any Collision-Resistant Function
Recent collision-finding attacks against hash functions such as MD5 and SHA-1 motivate the use of provably collision-resistant (CR) functions in their place. Finding a collision ...
Thomas Ristenpart, Thomas Shrimpton