Sciweavers

8655 search results - page 415 / 1731
» Challenges for Trusted Computing
Sort
View
ER
2004
Springer
169views Database» more  ER 2004»
15 years 9 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
15 years 9 months ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
15 years 8 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
ISSA
2008
15 years 5 months ago
Spam Over Internet Telephony and How to Deal with it
In our modern society telephony has developed to an omnipresent service. People are available at anytime and anywhere. Furthermore the Internet has emerged to an important communi...
Rachid El Khayari, Nicolai Kuntze, Andreas U. Schm...
BMCBI
2010
105views more  BMCBI 2010»
15 years 4 months ago
GWAMA: software for genome-wide association meta-analysis
Background: Despite the recent success of genome-wide association studies in identifying novel loci contributing effects to complex human traits, such as type 2 diabetes and obesi...
Reedik Mägi, Andrew P. Morris