Sciweavers

152 search results - page 19 / 31
» On Signatures of Knowledge
Sort
View
PODC
2011
ACM
12 years 11 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
EUROSSC
2007
Springer
14 years 2 months ago
Mapping by Seeing - Wearable Vision-Based Dead-Reckoning, and Closing the Loop
We introduce, characterize and test a vision-based dead-reckoning system for wearable computing that allows to track the user’s trajectory in an unknown and non-instrumented envi...
Daniel Roggen, Reto Jenny, Patrick de la Hamette, ...
SEC
2007
13 years 10 months ago
Trust Evaluation for Web Applications based on Behavioral Analysis
This paper deals with a joint use of a trust evaluation approach and access control mechanisms for improving security in Web-usage. Trust evaluation is achieved by means of both be...
Luiz Fernando Rust C. Carmo, Breno G. de Oliveira,...
ASPDAC
2000
ACM
95views Hardware» more  ASPDAC 2000»
14 years 24 days ago
Fair watermarking techniques
Many intellectual property protection (IPP) techniques have been proposed. Their primary objectives are providing convincible proof of authorship with least degradation of the qua...
Gang Qu, Jennifer L. Wong, Miodrag Potkonjak
CCS
2005
ACM
14 years 2 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...