Sciweavers

15379 search results - page 320 / 3076
» Protecting users from
Sort
View
138
Voted
WOA
2001
15 years 5 months ago
Multi-User and Security Support for Multi-Agent Systems
This paper discusses the requirements an agent system needs to be secure. In particular, the paper introduces a classification of modern distributed systems, and examines the dele...
Agostino Poggi, Giovanni Rimassa, Michele Tomaiuol...
124
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
148
Voted
IUI
2000
ACM
15 years 8 months ago
Learning to recommend from positive evidence
In recent years, many systems and approaches for recommending information, products or other objects have been developed. In these systems, often machine learning methods that nee...
Ingo Schwab, Wolfgang Pohl, Ivan Koychev
148
Voted
ICIP
2008
IEEE
16 years 5 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...
76
Voted
WWW
2009
ACM
16 years 4 months ago
Privacy diffusion on the web: a longitudinal perspective
For the last few years we have studied the diffusion of private information about users as they visit various Web sites triggering data gathering aggregation by third parties. Thi...
Balachander Krishnamurthy, Craig E. Wills