Sciweavers

859 search results - page 164 / 172
» Security for Key Management Interfaces
Sort
View
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
14 years 4 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
ISW
2009
Springer
14 years 4 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
GROUP
2009
ACM
14 years 4 months ago
Locating patient expertise in everyday life
Coping with a new health issue often requires individuals to acquire knowledge and skills to manage personal health. Many patients turn to one another for experiential expertise o...
Andrea Civan, David W. McDonald, Kenton T. Unruh, ...
ICMI
2003
Springer
128views Biometrics» more  ICMI 2003»
14 years 3 months ago
Modeling multimodal integration patterns and performance in seniors: toward adaptive processing of individual differences
Multimodal interfaces are designed with a focus on flexibility, although very few currently are capable of adapting to major sources of user, task, or environmental variation. The...
Benfang Xiao, Rebecca Lunsford, Rachel Coulston, R...
MHCI
2005
Springer
14 years 3 months ago
Building social discourse around mobile photos: a systemic perspective
Camera phones have been viewed simplistically as digital cameras with poor picture quality while neglecting the utility of the two key functionalities of mobile phones: network co...
Risto Sarvas, Antti Oulasvirta, Giulio Jacucci