Sciweavers

490 search results - page 32 / 98
» Enabling User Control with Personal Identity Management
Sort
View
99
Voted
CCS
2001
ACM
15 years 4 months ago
Efficient State Updates for Key Management
Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed ...
Benny Pinkas
BMCBI
2008
156views more  BMCBI 2008»
15 years 17 days ago
ArrayWiki: an enabling technology for sharing public microarray data repositories and meta-analyses
Background: A survey of microarray databases reveals that most of the repository contents and data models are heterogeneous (i.e., data obtained from different chip manufacturers)...
Todd H. Stokes, J. T. Torrance, Henry Li, May D. W...
107
Voted
IJNSEC
2008
85views more  IJNSEC 2008»
15 years 14 days ago
A Self-healing Key Distribution Scheme with Novel Properties
We improve a secret sharing scheme, which enables users select their personal keys by themselves instead of being distributed by group manager and users can reuse their personal k...
Biming Tian, Mingxing He
98
Voted
CIKM
2008
Springer
15 years 2 months ago
Leveraging social context for searching social media
The ability to utilize and benefit from today's explosion of social media sites depends on providing tools that allow users to productively participate. In order to participa...
Marc Smith, Vladimir Barash, Lise Getoor, Hady Wir...
110
Voted
CORR
2006
Springer
92views Education» more  CORR 2006»
15 years 15 days ago
Personal Information Ecosystems and Implications for Design
Today, people use multiple devices to fulfill their information needs. However, designers design each device individually, without accounting for the other devices that users may ...
Manas Tungare, Pardha S. Pyla, Manuel A. Pé...