Sciweavers

315 search results - page 24 / 63
» Distributed Identity Management Model for Digital Ecosystems
Sort
View
96
Voted
SEMWEB
2001
Springer
15 years 2 months ago
The ICS-FORTH RDFSuite: Managing Voluminous RDF Description Bases
Metadata are widely used in order to fully exploit information resources available on corporate intranets or the Internet. The Resource Description Framework (RDF) aims at facilit...
Sofia Alexaki, Vassilis Christophides, Gregory Kar...
MOBISYS
2007
ACM
15 years 9 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
SASN
2004
ACM
15 years 3 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
MM
2003
ACM
168views Multimedia» more  MM 2003»
15 years 2 months ago
Interacting with audio streams for entertainment and communication
We present a new model of interactive audio for entertainment and communication. A new device called the DJammer and its associated technologies are described. The DJammer introdu...
Mat C. Hans, Mark T. Smith
CCS
2006
ACM
15 years 1 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven