Sciweavers

922 search results - page 164 / 185
» Attribute based data sharing with attribute revocation
Sort
View
NDSS
2007
IEEE
15 years 4 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
15 years 3 months ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier
EKAW
1992
Springer
15 years 1 months ago
eQuality: An Application of DDucks to Process Management
Process management is a method for improving Boeing's business processes, however many aspects have been difficult to implement. eQuality is a software system based on a frame...
Jeffrey Bradshaw, Peter Holm, Oscar Kipersztok, Th...
BMCBI
2010
104views more  BMCBI 2010»
14 years 9 months ago
Bidirectional best hit r-window gene clusters
Background: Conserved gene clusters are groups of genes that are located close to one another in the genomes of several species. They tend to code for proteins that have a functio...
Melvin Zhang, Hon Wai Leong
72
Voted
BMCBI
2008
86views more  BMCBI 2008»
14 years 9 months ago
Predicting protein linkages in bacteria: Which method is best depends on task
Background: Applications of computational methods for predicting protein functional linkages are increasing. In recent years, several bacteria-specific methods for predicting link...
Anis Karimpour-Fard, Sonia M. Leach, Ryan T. Gill,...