Sciweavers

15379 search results - page 453 / 3076
» Protecting users from
Sort
View
147
Voted
VTC
2006
IEEE
15 years 10 months ago
Successive Interference Cancellation in Clipped and Product Combining aided FFH Multi-User Systems
— In this contribution, we propose two successive interference cancellation (SIC) schemes for a fast frequency hopping (FFH) multiple access (MA) system using M-ary frequency shi...
Sohail Ahmed, Lie-Liang Yang, Lajos Hanzo
ITCC
2005
IEEE
15 years 10 months ago
Dynamic Web Content Filtering based on User's Knowledge
This paper focuses on the development of a maintainable information filtering system. The simple and efficient solution to this problem is to block the Web sites by URL, including...
N. Churcharoenkrung, Yang Sok Kim, Byeong Ho Kang
128
Voted
CSCW
2000
ACM
15 years 9 months ago
Evolution of Contact Point: a case study of a help desk and its users
This paper describes the evolution of a concept, Contact Point, the research process through which it evolved, and the work context and practices which drove its evolution. Contac...
Lena Mamykina, Catherine G. Wolf
121
Voted
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 9 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo
ESORICS
2008
Springer
15 years 6 months ago
User Privacy in Transport Systems Based on RFID E-Tickets
Abstract. Recently, operators of public transportation in many countries started to roll out electronic tickets (e-tickets). E-tickets offer several advantages to transit enterpris...
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachs...