Sciweavers

490 search results - page 21 / 98
» Enabling User Control with Personal Identity Management
Sort
View
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 6 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
ERCIMDL
2004
Springer
137views Education» more  ERCIMDL 2004»
15 years 5 months ago
Managing a Paradigm Shift - Aligning Management, Privacy Policy, Technology and Standards
It is argued that we are experiencing a paradigm shift from a user perspective to a client perspective in library and information science. The paradigm shift is brought about by re...
Jonas Holmström
CONEXT
2009
ACM
15 years 1 months ago
Traffic management and resource allocation in small wired/wireless networks
We consider the problem of traffic management in small networks with both wireless and wired devices, connected to the Internet through a single gateway. Examples of such networks...
Christos Gkantsidis, Thomas Karagiannis, Peter B. ...
HUC
2005
Springer
15 years 6 months ago
DigiDress: A Field Trial of an Expressive Social Proximity Application
In May 2005 Nokia Sensor application (www.nokia.com/sensor) was launched, allowing mobile phone users to create digital identity expressions, seen by other users within Bluetooth r...
Per Persson, Jan Blom, Younghee Jung
WICSA
2008
15 years 1 months ago
uDesign: End-User Design Applied to Monitoring and Control Applications for Smart Spaces
This paper introduces an architectural style for enabling end-users to quickly design and deploy software systems in domains characterized by highly personalized and dynamic requi...
João Pedro Sousa, Bradley R. Schmerl, Vahe ...