Sciweavers

1257 search results - page 234 / 252
» Associating People and Documents
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 3 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
HICSS
2003
IEEE
201views Biometrics» more  HICSS 2003»
15 years 3 months ago
Design and Evaluation of Improvement method on the Web Information Navigation - A Stochastic Search Approach
With the advent of fast growing Internet and World Wide Web (WWW), more and more companies start the electronic commerce to enhance the business competitiveness. On the other hand...
Benjamin P.-C. Yen, Y.-W. Wan
AFRICACRYPT
2010
Springer
15 years 3 months ago
Strong Cryptography from Weak Secrets
the full version of the extended abstract which appears in Africacrypt ’10 (3 – 6 may 2010, Stellenbosch, South Africa) D. Bernstein and T. Lange Eds., Springer-Verlag, LNCS 60...
Xavier Boyen, Céline Chevalier, Georg Fuchs...
ERCIMDL
2009
Springer
177views Education» more  ERCIMDL 2009»
15 years 2 months ago
Curated Databases
Curated databases are databases that are populated and updated with a great deal of human effort. Most reference works that one traditionally found on the reference shelves of li...
Peter Buneman
WIA
2001
Springer
15 years 2 months ago
Adaptive Rule-Driven Devices - General Formulation and Case Study
A formal device is said to be adaptive whenever its behavior changes dynamically, in a direct response to its input stimuli, without interference of external agents, even its user...
João José Neto