Sciweavers

219 search results - page 41 / 44
» Privacy for Private Key in Signatures
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Sara Sinclair, Sean W. Smith
ACSAC
2009
IEEE
14 years 1 months ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning
PERVASIVE
2010
Springer
14 years 1 months ago
Object-Based Activity Recognition with Heterogeneous Sensors on Wrist
Abstract. This paper describes how we recognize activities of daily living (ADLs) with our designed sensor device, which is equipped with heterogeneous sensors such as a camera, a ...
Takuya Maekawa, Yutaka Yanagisawa, Yasue Kishino, ...
CSCW
2011
ACM
13 years 4 months ago
Faceted identity, faceted lives: social and technical issues with being yourself online
This paper explores key issues people experience managing personal boundaries within and across social technologies. We look in particular at email and online social networks. We ...
Shelly Farnham, Elizabeth F. Churchill
ICNP
2007
IEEE
14 years 4 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...