Sciweavers

2656 search results - page 29 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
ICC
2008
IEEE
14 years 2 months ago
Using Personal Electronic Device for Authentication-Based Service Access
Abstract—A person usually carries multiple authentication tokens in the form of various cards to access services electronically. Often the service outlets are equipped with a str...
Abhishek Gaurav, Ankit Sharma, Vikas Gelara, Rajat...
SAFECOMP
2007
Springer
14 years 1 months ago
Experimental Evaluation of the DECOS Fault-Tolerant Communication Layer
This paper presents an experimental evaluation of the fault-tolerant communication (FTCOM) layer of the DECOS integrated architecture. The FTCOM layer implements different agreemen...
Jonny Vinter, Henrik Eriksson, Astrit Ademaj, Bern...
EUPROJECTS
2006
Springer
13 years 11 months ago
User Interfaces for Persons with Deafblindness
This paper examines problems persons with deafblindness have when using computers and it analyses how we can approach these problems in the redesign of a communication tool. A qual...
Sara Rutgersson, Mattias Arvola
DIM
2005
ACM
13 years 9 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
IJCAI
2007
13 years 9 months ago
Privacy and Artificial Agents, or, Is Google Reading My Email?
We investigate legal and philosophical notions of privacy in the context of artificial agents. Our analysis utilizes a normative account of privacy that defends its value and the ...
Samir Chopra, Laurence White