Sciweavers

464 search results - page 49 / 93
» Identity Management
Sort
View
145
Voted
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 8 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
112
Voted
CHI
2006
ACM
16 years 2 months ago
To have and to hold: exploring the personal archive
The personal archive is not only about efficient storage and retrieval of information. This paper describes a study of forty-eight academics and the techniques and tools they use ...
Joseph Kaye, Janet Vertesi, Shari Avery, Allan Daf...
138
Voted
QUACON
2009
Springer
15 years 9 months ago
A Context Quality Model to Support Transparent Reasoning with Uncertain Context
Much research on context quality in context-aware systems divides into two strands: (1) the qualitative identication of quality measures and (2) the use of uncertain reasoning tec...
Susan McKeever, Juan Ye, Lorcan Coyle, Simon Dobso...
MINENET
2005
ACM
15 years 8 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
145
Voted
IDA
1999
Springer
15 years 6 months ago
Reasoning about Input-Output Modeling of Dynamical Systems
The goal of input-output modeling is to apply a test input to a system, analyze the results, and learn something useful from the causeeffect pair. Any automated modeling tool that...
Matthew Easley, Elizabeth Bradley