Sciweavers

178 search results - page 29 / 36
» Legal Issues in Cyberspace
Sort
View
SIGUCCS
2004
ACM
14 years 23 days ago
Software's little helpers: managing your lab areas
There are always more labs and other things to attend to than available bodies to watch over said pesky details. How can we keep an eye on the ever-present large and small events ...
Doug Simpson
WPES
2004
ACM
14 years 23 days ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
ACMICEC
2003
ACM
90views ECommerce» more  ACMICEC 2003»
14 years 18 days ago
Automated analysis of P3P-enabled Web sites
The Platform for Privacy Preferences (P3P) provides a standard computer-readable format for privacy policies and a protocol that enables web browsers to read and process these pol...
Simon Byers, Lorrie Faith Cranor, David P. Kormann
ACSAC
2002
IEEE
14 years 9 days ago
A Secure Directory Service based on Exclusive Encryption
We describe the design of a Windows file-system directory service that ensures the persistence, integrity, privacy, syntactic legality, and case-insensitive uniqueness of the name...
John R. Douceur, Atul Adya, Josh Benaloh, William ...
CLEF
2000
Springer
13 years 11 months ago
The Use of NLP Techniques in CLIR
The application of nlp techniques to improve the results of information retrieval is still considered as a controversial issue, whereas nlp techniques in cross-language informatio...
Bärbel Ripplinger