Sciweavers

2259 search results - page 84 / 452
» Separation and information hiding
Sort
View
SEMWEB
2007
Springer
14 years 3 months ago
Recommendation Privacy Protection in Trust-based Knowledge Sharing Network
Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-rel...
Weisen Guo, Steven B. Kraines
AINA
2006
IEEE
14 years 3 months ago
Dual RSA Accumulators and Its Application for Private Revocation Check
This paper points out the privacy issue in the OCSP (Online Certificate Status Protocol), namely, the OCSP responder learns confidential information – who sends a message to w...
Hiroaki Kikuchi
TABLETOP
2006
IEEE
14 years 2 months ago
Transparent Tabletop Interface for Multiple Users on Lumisight Table
This paper presents a new type of tabletop interface on Lumisight Table. Putting physical objects on a tabletop display is one of the typical methods for intuitive tangible input....
Yasuaki Kakehi, Takero Hosomi, Makoto Iida, Takesh...
SAC
2006
ACM
14 years 2 months ago
Lost in just the translation
This paper describes the design and implementation of a scheme for hiding information in translated natural language text, and presents experimental results using the implemented ...
Ryan Stutsman, Christian Grothoff, Mikhail J. Atal...
SASN
2006
ACM
14 years 2 months ago
Achieving privacy in mesh networks
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
Xiaoxin Wu, Ninghui Li