Sciweavers

274 search results - page 41 / 55
» Security user studies: methodologies and best practices
Sort
View
RIDE
2003
IEEE
14 years 4 months ago
On Database Support for Multilingual Environments
Global e-Commerce and mass-outreach e-Governance programs have brought into sharp focus the need for database systems to store and manipulate text data efficiently in a suite of ...
A. Kumaran, Jayant R. Haritsa
JDCTA
2010
125views more  JDCTA 2010»
13 years 5 months ago
Reliable Information Transmission: A Chaotic Sequence-Based Authentication Scheme for Radio Environment Maps Enabled Cognitive R
With the intent of efficient occupying under-utilized spectrum, radio environment map (REM) based cognitive radio (CR) networking is proposed to facilitate the distributed spectru...
Li Zhang, Guoxin Zheng
SIN
2010
ACM
13 years 8 months ago
Analysis of privacy in online social networks of runet
In recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situation...
Slava Kisilevich, Florian Mansmann
CRYPTO
2006
Springer
106views Cryptology» more  CRYPTO 2006»
14 years 2 months ago
On Robust Combiners for Private Information Retrieval and Other Primitives
Abstract. Let A and B denote cryptographic primitives. A (k, m)robust A-to-B combiner is a construction, which takes m implementations of primitive A as input, and yields an implem...
Remo Meier, Bartosz Przydatek
EDBT
2008
ACM
150views Database» more  EDBT 2008»
14 years 11 months ago
Finding time-dependent shortest paths over large graphs
The spatial and temporal databases have been studied widely and intensively over years. In this paper, we study how to answer queries of finding the best departure time that minim...
Bolin Ding, Jeffrey Xu Yu, Lu Qin