Sciweavers

4755 search results - page 458 / 951
» An Implementation Model for Collaborative Applications
Sort
View
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
16 years 1 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
150
Voted
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 12 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
ICDCS
2008
IEEE
15 years 11 months ago
Mobility-Assisted Spatiotemporal Detection in Wireless Sensor Networks
Wireless sensor networks (WSNs) deployed for missioncritical applications face the fundamental challenge of meeting stringent spatiotemporal performance requirements using nodes w...
Guoliang Xing, Jianping Wang, Ke Shen, Qingfeng Hu...
IEEEARES
2008
IEEE
15 years 11 months ago
Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System
Recommender systems enable merchants to assist customers in finding products that best satisfy their needs. Unfortunately, current recommender systems suffer from various privacy...
Esma Aïmeur, Gilles Brassard, José Man...
WETICE
2007
IEEE
15 years 11 months ago
Context Adaptation of Web Service Orchestrations
With orchestrations, one service may be realized through the cooperation of several services. This cooperation has to be formally described. In this paper, we propose to describe ...
Frédérick Seyler, Chantal Taconet, G...