Sciweavers

8655 search results - page 298 / 1731
» Challenges for Trusted Computing
Sort
View
CHI
2005
ACM
16 years 3 months ago
A study of preferences for sharing and privacy
We describe studies of preferences about information sharing aimed at identifying fundamental concerns with and at understanding how people might abstract the details of sharing i...
Judith S. Olson, Jonathan Grudin, Eric Horvitz
CHI
2004
ACM
16 years 3 months ago
Connecting with the absent presence: pervasive technology use and effects on community
This research investigates how the pervasive use of technology by an individual in the physical presence of group members affects community level. When technology use occurs, the ...
Lisa Kleinman
CSIE
2009
IEEE
15 years 10 months ago
A Location-Based Mechanism for Mobile Device Security
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital safeguard against unauthorized access to a device’s...
Wayne A. Jansen, Vlad Korolev
CSIE
2009
IEEE
15 years 10 months ago
An Enhanced-Security Fair E-payment Protocol
Customers are usually passive in an electronic commerce transaction. Based on a new two times concurrent signature, this article presents a fair electronic payment (E-payment) pro...
Wei Fan, Huaying Shu, Elizabeth Fife, Qiang Yan
148
Voted
NCA
2009
IEEE
15 years 10 months ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman