Sciweavers

408 search results - page 57 / 82
» Tailoring Privacy to Users' Needs
Sort
View
ICDCS
2008
IEEE
14 years 2 months ago
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications
The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the securi...
Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhon...
HT
2004
ACM
14 years 1 months ago
Managing conflict in multi-model adaptive hypertext
Adaptive hypermedia has the goal of contextualizing the display of a hypertext to suit the user and their situation. A variety of aspects of the context can influence the appropri...
Luis Francisco-Revilla, Frank M. Shipman III
AIR
2004
98views more  AIR 2004»
13 years 7 months ago
Further Experiments on Collaborative Ranking in Community-Based Web Search
As the search engine arms-race continues, search engines are constantly looking for ways to improve the manner in which they respond to user queries. Given the vagueness of Web sea...
Jill Freyne, Barry Smyth, Maurice Coyle, Evelyn Ba...
WISA
2009
Springer
14 years 2 months ago
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is associated with a set of attributes, and the ciphertext is associated with an access policy over attr...
Luan Ibraimi, Milan Petkovic, Svetla Nikova, Piete...
SOUPS
2009
ACM
14 years 2 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall