Sciweavers

817 search results - page 60 / 164
» Using Ontology for Personalized Mobile Message Computation
Sort
View
124
Voted
JCP
2006
120views more  JCP 2006»
15 years 3 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
130
Voted
GI
2007
Springer
15 years 7 months ago
User Profile Refinement Using Explicit User Interest Modeling
: In this paper, we present an approach to refine user profiles that were derived from Web server logs in an automated procedure. In most application scenarios, such automatically ...
Gerald Stermsek, Mark Strembeck, Gustaf Neumann
142
Voted
DIM
2007
ACM
15 years 7 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
124
Voted
WPES
2003
ACM
15 years 9 months ago
Reusable anonymous return channels
Mix networks are used to deliver messages anonymously to recipients, but do not straightforwardly allow the recipient of an anonymous message to reply to its sender. Yet the abili...
Philippe Golle, Markus Jakobsson
122
Voted
W4A
2006
ACM
15 years 9 months ago
The meaning of 'life': capturing intent from web authors
Interest in accessing the Web from small, mobile devices, such as cell phones, is increasing rapidly. The challenge of delivering content to such devices is similar in many ways t...
Rhys Lewis