Sciweavers

269 search results - page 33 / 54
» Who Thinks Who Knows Who
Sort
View
SP
2006
IEEE
14 years 1 months ago
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
Philippe Golle, XiaoFeng Wang, Markus Jakobsson, A...
ICMCS
2005
IEEE
102views Multimedia» more  ICMCS 2005»
14 years 29 days ago
Video quality analysis for an automated video capturing and editing system for conversation scenes
This paper introduces video quality analysis for automated video capture and editing. Previously, we proposed an automated video capture and editing system for conversation scenes...
Takashi Nishizaki, Ryo Ogata, Yuichi Kameda, Yoshi...
SISW
2005
IEEE
14 years 28 days ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
GI
2005
Springer
14 years 27 days ago
Entity Recognition for Sensor Network Motes
d Abstract) Stefan Lucks1 , Erik Zenner2 , Andr´e Weimerskirch3 , Dirk Westhoff4 1 Theoretische Informatik, University of Mannheim, Germany 2 Erik Zenner, Cryptico A/S, Copenhagen...
Stefan Lucks, Erik Zenner, André Weimerskir...
FOSSACS
2004
Springer
14 years 23 days ago
Reasoning about Dynamic Policies
People often need to reason about policy changes before they are adopted. For example, suppose a website manager knows that users want to enter her site without going through the w...
Riccardo Pucella, Vicky Weissman