Sciweavers

490 search results - page 75 / 98
» Enabling User Control with Personal Identity Management
Sort
View
113
Voted
CCS
2010
ACM
15 years 10 months ago
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...
152
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks
—Cognitive Radio Networks (CRNs) have recently emerged as a promising technology to improve spectrum utilization by allowing secondary users to dynamically access idle primary ch...
Jin Jin, Hong Xu, Baochun Li
135
Voted
IEEEICCI
2003
IEEE
15 years 9 months ago
Conceptual Framework for Interactive Ontology Building
Abstract— An ontology is a formal language adequately representing the knowledge used for reasoning in a specific environment. When contradictions arise and make ontologies inad...
Jean Sallantin, Jacques Divol, Patrice Duroux
117
Voted
CCS
2006
ACM
15 years 7 months ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
157
Voted
WPES
2003
ACM
15 years 8 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett