Sciweavers

81 search results - page 12 / 17
» Trust as a Key to Improving Recommendation Systems
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
DATE
2004
IEEE
139views Hardware» more  DATE 2004»
14 years 10 days ago
Flexible Software Protection Using Hardware/Software Codesign Techniques
A strong level of trust in the software running on an embedded processor is a prerequisite for its widespread deployment in any high-risk system. The expanding field of software p...
Joseph Zambreno, Alok N. Choudhary, Rahul Simha, B...
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
14 years 21 days ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
GIS
2009
ACM
14 years 3 months ago
An agenda for the next generation gazetteer: geographic information contribution and retrieval
Gazetteers are key components of georeferenced information systems, including applications such as Web-based mapping services. Existing gazetteers lack the capabilities to fully i...
Carsten Keßler, Krzysztof Janowicz, Mohamed ...
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
14 years 2 months ago
Implementation of Internet Technology for Local Government Website: Design Guidelines
There may be limited resources for local government website designers to devote to innovative design. This study investigated current technology use by local government (Town of B...
Hyung Nam Kim, Andrea L. Kavanaugh, Tonya L. Smith...