Sciweavers

1018 search results - page 110 / 204
» Remote User Authentication Using Public Information
Sort
View
WWW
2006
ACM
14 years 8 months ago
Towards content trust of web resources
Trust is an integral part of the Semantic Web architecture. Most prior work on trust focuses on entity-centered issues such as authentication and reputation and does not take into...
Yolanda Gil, Donovan Artz
SOFTVIS
2005
ACM
14 years 1 months ago
Visualization of mobile object environments
This paper presents a system for visualizing mobile object frameworks. In such frameworks, the objects can migrate to remote hosts, along with their state and behavior, while the ...
Yaniv Frishman, Ayellet Tal
KRDB
1998
93views Database» more  KRDB 1998»
13 years 9 months ago
Intelligent Caching for Information Mediators: A KR Based Approach
We present a semantic caching approach for optimizing the performance of information mediators. A critical problem with information mediators, particularly those gathering and int...
Naveen Ashish, Craig A. Knoblock, Cyrus Shahabi
SOCIALCOM
2010
13 years 5 months ago
q-Anon: Rethinking Anonymity for Social Networks
This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as kanonymity...
Aaron Beach, Mike Gartrell, Richard Han
ASIACRYPT
2004
Springer
14 years 1 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...