Sciweavers

6555 search results - page 1187 / 1311
» Secure attribute-based systems
Sort
View
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
15 years 11 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
CHI
2010
ACM
15 years 9 months ago
Friends only: examining a privacy-enhancing behavior in facebook
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...
Fred Stutzman, Jacob Kramer-Duffield
127
Voted
CHI
2010
ACM
15 years 9 months ago
Newport: enabling sharing during mobile calls
Newport is a collaborative application for sharing context (e.g. location) and content (e.g. photos and notes) during mobile phone calls. People can share during a phone call and ...
Junius Gunaratne, A. J. Bernheim Brush
96
Voted
SAC
2010
ACM
15 years 9 months ago
Content cloaking: preserving privacy with Google Docs and other web applications
Web office suites such as Google Docs offer unparalleled collaboration experiences in terms of low software requirements, ease of use, data ubiquity, and availability. When the d...
Gabriele D'Angelo, Fabio Vitali, Stefano Zacchirol...
114
Voted
ICDCN
2010
Springer
15 years 9 months ago
An Intelligent IT Infrastructure for the Future
The proliferation of new modes of communication and collaboration has resulted in an explosion of digital information. To turn this challenge into an opportunity, the IT industry ...
Prith Banerjee
« Prev « First page 1187 / 1311 Last » Next »