Sciweavers

1618 search results - page 44 / 324
» Privacy Interfaces for Information Management
Sort
View
SIGSOFT
2010
ACM
13 years 5 months ago
Social media for software engineering
Social media has changed the way that people collaborate and share information. In this paper, we highlight its impact for enabling new ways for software teams to form and work to...
Andrew Begel, Robert DeLine, Thomas Zimmermann
CCS
2007
ACM
14 years 1 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
IH
1998
Springer
13 years 12 months ago
Biometric yet Privacy Protecting Person Authentication
Many eligibility or entitlement certificates in every day life are non-transferable between persons. However, they are usually implemented by personal physical tokens that owners c...
Gerrit Bleumer
EUC
2004
Springer
14 years 1 months ago
Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags
A Radio-Frequency-Identification (RFID) tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. It emits an ID in response to a query...
Junichiro Saito, Jae-Cheol Ryou, Kouichi Sakurai
CHI
2007
ACM
14 years 8 months ago
Management of personal information scraps
We introduce research on information scraps ? short, self-contained personal notes that fall outside of traditional filing schemes. We report on a preliminary study of information...
Michael S. Bernstein, Max Van Kleek, m. c. schraef...