Sciweavers

791 search results - page 82 / 159
» Users and Trust in Cyberspace
Sort
View
PSYCHNOLOGY
2008
112views more  PSYCHNOLOGY 2008»
13 years 7 months ago
Tags and the City
This paper analyzes the findings of a set of field studies that explored the use of near field communication (NFC) tags in a mixed reality environment for providing access to digi...
Minna Isomursu
WWW
2007
ACM
14 years 8 months ago
Simple authentication for the web
Automated email-based password reestablishment (EBPR) is an efficient, cost-effective means to deal with forgotten passwords. In this technique, email providers authenticate users ...
Timothy W. van der Horst, Kent E. Seamons
OSDI
2002
ACM
14 years 8 months ago
Ivy: A Read/Write Peer-to-Peer File System
Ivy is a multi-user read/write peer-to-peer file system. Ivy has no centralized or dedicated components, and it provides useful integrity properties without requiring users to ful...
Athicha Muthitacharoen, Robert Morris, Thomer M. G...
EDBT
2008
ACM
95views Database» more  EDBT 2008»
14 years 7 months ago
Zerber: r-confidential indexing for distributed documents
To carry out work assignments, small groups distributed within a larger enterprise often need to share documents among themselves while shielding those documents from others'...
Sergej Zerr, Elena Demidova, Daniel Olmedilla, Wol...
COMCOM
2008
153views more  COMCOM 2008»
13 years 7 months ago
A TTP-free protocol for location privacy in location-based services
Location-based services (LBS) will be a keystone of the new information society that is founded on the information and communications technologies (ICTs). Mobile devices such as c...
Agusti Solanas, Antoni Martínez-Ballest&eac...