Sciweavers

344 search results - page 31 / 69
» trust 2009
Sort
View
GLOBE
2009
Springer
14 years 1 months ago
Protecting Data Privacy in Structured P2P Networks
P2P systems are increasingly used for efficient, scalable data sharing. Popular applications focus on massive file sharing. However, advanced applications such as online communiti...
Mohamed Jawad, Patricia Serrano-Alvarado, Patrick ...
ATC
2009
Springer
14 years 20 days ago
SAConf: Semantic Attestation of Software Configurations
Remote attestation is one of the key functionalities provided by trusted platforms. Most current attestation approaches are based on cryptographic hash functions, which are appropr...
Hua Wang, Yao Guo, Xiangqun Chen
HICSS
2009
IEEE
94views Biometrics» more  HICSS 2009»
14 years 3 months ago
Enhancing Learning Experiences in Partially Distributed Teams: Training Students to Work Effectively Across Distances
Three training modules were designed to decrease ingroup dynamics in Partially Distributed Teams, which have two or more geographically separated subteams. The action research ori...
Rosalie J. Ocker, Dana Kracaw, Starr Roxanne Hiltz...
ACL
2009
13 years 6 months ago
The Lie Detector: Explorations in the Automatic Recognition of Deceptive Language
In this paper, we present initial experiments in the recognition of deceptive language. We introduce three data sets of true and lying texts collected for this purpose, and we sho...
Rada Mihalcea, Carlo Strapparava
ICALP
2009
Springer
14 years 9 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...