Sciweavers

1834 search results - page 155 / 367
» Public Key Cryptography
Sort
View
DGO
2008
96views Education» more  DGO 2008»
13 years 11 months ago
Laying the foundations for public participation and value advocacy: interaction design for a large scale urban simulation
Supporting public participation is often a key goal in the design of digital government systems. However, years of work may be required before a complex system, such as the UrbanS...
Batya Friedman, Alan Borning, Janet Davis, Brian T...
ISSA
2004
13 years 11 months ago
The Protection Of Public Health Data - A Case Study
South Africa's health system consists of a large public sector and a smaller but fast-growing private sector. Health care varies from the most basic primary health care, offe...
S. Nkundlaa
ESORICS
2009
Springer
14 years 4 months ago
Privacy Preserving Publication of Moving Object Data
The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise...
Francesco Bonchi
ELPUB
2007
ACM
14 years 1 months ago
Beyond Publication - A Passage Through Project StORe
The principal aim of Project StORe is to provide middleware that will enable bi-directional links between source repositories of research data and the output repositories containi...
Graham Pryor
CTRSA
2004
Springer
106views Cryptology» more  CTRSA 2004»
14 years 1 months ago
Improving Robustness of PGP Keyrings by Conflict Detection
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
Qinglin Jiang, Douglas S. Reeves, Peng Ning