Sciweavers

1120 search results - page 161 / 224
» Trust in Electronic Environments
Sort
View
CSUR
2010
373views more  CSUR 2010»
13 years 7 months ago
A survey of confidential data storage and deletion methods
As the amount of digital data grows, so does the theft of sensitive data through the loss or misplacement of laptops, thumb drives, external hard drives, and other electronic stor...
Sarah M. Diesburg, An-I Andy Wang
CORR
2010
Springer
218views Education» more  CORR 2010»
13 years 6 months ago
User Centered and Ontology Based Information Retrieval System for Life Sciences
Because of the increasing number of electronic data, designing efficient tools to retrieve and exploit documents is a major challenge. Current search engines suffer from two main d...
Sylvie Ranwez, Vincent Ranwez, Mohameth-Fran&ccedi...
ICASSP
2011
IEEE
13 years 1 months ago
Perceiving graphical and pictorial information via touch and hearing
With the ever increasing availability of the Internet and electronic media rich in graphical and pictorial information – for communication, commerce, entertainment, art, educati...
Pubudu Madhawa Silva, Thrasyvoulos N. Pappas, Josh...
WWW
2005
ACM
14 years 10 months ago
An abuse-free fair contract signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
FC
2009
Springer
104views Cryptology» more  FC 2009»
14 years 4 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp