Sciweavers

3299 search results - page 612 / 660
» Privacy and Trusted Computing
Sort
View
CHI
2002
ACM
14 years 9 months ago
Technologies for families
We describe the design and use of a system facilitating the sharing of calendar information between remotely located, multi-generational family members. Most previous work in this...
Catherine Plaisant, Allison Druin, Hilary Hutchins...
VLDB
2007
ACM
115views Database» more  VLDB 2007»
14 years 9 months ago
NS2: Networked Searchable Store with Correctness
In an outsourced data framework, we introduce and demonstrate mechanisms for securely storing a set of data items (documents) on an un-trusted server, while allowing for subsequen...
Radu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan K...
PERCOM
2004
ACM
14 years 8 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
MOBIHOC
2003
ACM
14 years 8 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
CHI
2010
ACM
14 years 3 months ago
Sharing conversation and sharing life: video conferencing in the home
Video conferencing is a technology that families and friends use to connect with each other over distance. However, even with such technology readily available, we still do not ha...
Tejinder K. Judge, Carman Neustaedter