Sciweavers

15379 search results - page 330 / 3076
» Protecting users from
Sort
View
130
Voted
CSCW
1998
ACM
15 years 3 months ago
User Advocacy in Participatory Design: Designers? Experiences with a New Communication Channel
We report on participatory design activities within the POLITeam project, a large project which introduces groupware into the German government. Working with a representative small...
Peter Mambrey, Gloria Mark, Uta Pankoke-Babatz
130
Voted
CCS
2009
ACM
15 years 10 months ago
Learning your identity and disease from research papers: information leaks in genome wide association study
Genome-wide association studies (GWAS) aim at discovering the association between genetic variations, particularly single-nucleotide polymorphism (SNP), and common diseases, which...
Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang,...
235
Voted
ASPLOS
2009
ACM
16 years 4 months ago
TwinDrivers: semi-automatic derivation of fast and safe hypervisor network drivers from guest OS drivers
In a virtualized environment, device drivers are often run inside a virtual machine (VM) rather than in the hypervisor, for reasons of safety and reduction in software engineering...
Aravind Menon, Simon Schubert, Willy Zwaenepoel
146
Voted
CCS
2008
ACM
15 years 5 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
112
Voted
CORR
2010
Springer
67views Education» more  CORR 2010»
15 years 3 months ago
Rate Regions of Secret Key Sharing in a New Source Model
A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, at the other si...
Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Rez...