Sciweavers

1663 search results - page 139 / 333
» Privacy and Identity Management
Sort
View
GROUP
2009
ACM
15 years 11 months ago
All My People Right Here, Right Now: management of group co-presence on a social networking site
A mundane but theoretically interesting and practically relevant situation presents itself on social networking sites: the co-presence of multiple groups important to an individua...
Airi Lampinen, Sakari Tamminen, Antti Oulasvirta
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
15 years 10 months ago
IP Multicast Video Broadcasting System with User Authentication
This report describes a pay broadcasting system for the Internet. This system would enable tens of thousands of people to access an identical video stream simultaneously. In this ...
Hiroki Onishi, Takashi Satoh, Tetsutaro Uehara, Ka...
SIGECOM
2010
ACM
157views ECommerce» more  SIGECOM 2010»
15 years 9 months ago
Congestible services and network effects
We study a system where many identical users of a service share a common resource. Each user is sensitive to congestion at the resource, but also experiences a positive network ef...
Ramesh Johari, Sunil Kumar
IEEEARES
2007
IEEE
15 years 11 months ago
A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network
We propose a practical verifiable e-voting protocol which guarantees e-voting requirements: privacy, eligibility, uniqueness, uncoercibility, fairness, accuracy, robustness, indiv...
Orhan Cetinkaya, Ali Doganaksoy
ACISP
2005
Springer
15 years 10 months ago
Cancelable Key-Based Fingerprint Templates
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data wil...
Russell Ang, Reihaneh Safavi-Naini, Luke McAven