Sciweavers

929 search results - page 110 / 186
» Personal information management with SEMEX
Sort
View
CHI
2006
ACM
14 years 8 months ago
Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applicati
The emergence of location-based computing promises new and compelling applications, but raises very real privacy risks. Existing approaches to privacy generally treat people as th...
Karen P. Tang, Pedram Keyani, James Fogarty, Jason...
ISW
2009
Springer
14 years 2 months ago
Robust Authentication Using Physically Unclonable Functions
Abstract. In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application...
Keith B. Frikken, Marina Blanton, Mikhail J. Atall...
FBIT
2007
IEEE
14 years 2 months ago
Evaluation of a Dominance-Based Rough Set Approach to Interface Design
This paper explores refinements to methods used in a procedure being developed by the authors to personalize user interfaces for online shopping support tools. In the authors’ ...
Timothy Maciag, Daryl H. Hepting, Robert J. Hilder...
ESORICS
2005
Springer
14 years 1 months ago
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
Abstract. Hippocratic Databases have been proposed as a mechanism to guarantee the respect of privacy principles in data management. We argue that three major principles are missin...
Fabio Massacci, John Mylopoulos, Nicola Zannone
HT
2004
ACM
14 years 1 months ago
Practical applitudes: case studies of applications of the ZigZag hypermedia system
ZigZag is a paradigm of hypermedia that consists of a multidimensional system of principled interconnections. Its basic features and specifications are now well known, but despite...
Adam Moore, James Goulding, Tim J. Brailsford, Hel...