Sciweavers

16 search results - page 2 / 4
» User participation in standards setting - the panacea
Sort
View
SOUPS
2009
ACM
13 years 11 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
EUROPKI
2004
Springer
13 years 10 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
TREC
2007
13 years 6 months ago
Language Models for Genomics Information Retrieval: UIUC at TREC 2007 Genomics Track
The University of Illinois at Urbana-Champaign (UIUC) participated in TREC 2007 Genomics Track. Our general goal of participation is to apply language modelbased approaches to the...
Yue Lu, Jing Jiang, Xu Ling, Xin He, ChengXiang Zh...
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
13 years 10 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
TREC
2003
13 years 6 months ago
Overview of the TREC 2003 Robust Retrieval Track
The robust retrieval track is a new track in TREC 2003. The goal of the track is to improve the consistency of retrieval technology by focusing on poorly performing topics. In add...
Ellen M. Voorhees