Sciweavers

464 search results - page 49 / 93
» Identity Management
Sort
View
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
14 years 1 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
CHI
2006
ACM
14 years 8 months ago
To have and to hold: exploring the personal archive
The personal archive is not only about efficient storage and retrieval of information. This paper describes a study of forty-eight academics and the techniques and tools they use ...
Joseph Kaye, Janet Vertesi, Shari Avery, Allan Daf...
QUACON
2009
Springer
14 years 2 months ago
A Context Quality Model to Support Transparent Reasoning with Uncertain Context
Much research on context quality in context-aware systems divides into two strands: (1) the qualitative identication of quality measures and (2) the use of uncertain reasoning tec...
Susan McKeever, Juan Ye, Lorcan Coyle, Simon Dobso...
MINENET
2005
ACM
14 years 1 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
IDA
1999
Springer
13 years 12 months ago
Reasoning about Input-Output Modeling of Dynamical Systems
The goal of input-output modeling is to apply a test input to a system, analyze the results, and learn something useful from the causeeffect pair. Any automated modeling tool that...
Matthew Easley, Elizabeth Bradley