Sciweavers

1834 search results - page 140 / 367
» Public Key Cryptography
Sort
View
EUROPKI
2009
Springer
13 years 7 months ago
Validity Models of Electronic Signatures and Their Enforcement in Practice
Abstract. An electronic signature is considered to be valid, if the signature is mathematically correct and if the signer's public key is classified as authentic. While the fi...
Harald Baier, Vangelis Karatsiolis
EGOV
2010
Springer
13 years 8 months ago
Information Strategies for Open Government: Challenges and Prospects for Deriving Public Value from Government Transparency
Information-based strategies to promote open government offer many opportunities to generate social and economic value through public use of government information. Public and poli...
Sharon S. Dawes, Natalie Helbig
GLOBECOM
2008
IEEE
14 years 4 months ago
Secure Context Switch for Private Computing on Public Platforms
— Private Computing on Public Platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platform...
Thomas H. Morris, V. S. S. Nair
ASSETS
2010
ACM
13 years 10 months ago
Improving public transit usability for blind and deaf-blind people by connecting a braille display to a smartphone
We conducted interviews with blind and deaf-blind people to understand how they use the public transit system. In this paper, we discuss key challenges our participants faced and ...
Shiri Azenkot, Emily Fortuna
AMI
2010
Springer
13 years 7 months ago
Geo-Social Interaction: Context-Aware Help in Large Scale Public Spaces
We present an approach to exploit social and spatio-temporal context in order to improve information dissemination in dynamic largescale public spaces. We illustrate it by applying...
Nasim Mahmud, Petr Aksenov, Ansar-Ul-Haque Yasar, ...