Sciweavers

2608 search results - page 353 / 522
» Issue Management
Sort
View
GIS
2009
ACM
15 years 1 months ago
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users
We propose a location-based query anonymization technique, LBS (k,T)-anonymization, that ensures anonymity of user's query in a specific time window against what we call know...
Amirreza Masoumzadeh, James Joshi, Hassan A. Karim...
106
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Secure video processing: Problems and challenges
Secure signal processing is an emerging technology to enable signal processing tasks in a secure and privacy-preserving fashion. It has attracted a great amount of research attent...
Wenjun Lu, Avinash L. Varna, Min Wu
124
Voted
WPES
2003
ACM
15 years 8 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
SIGUCCS
2003
ACM
15 years 8 months ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah
JTAER
2010
135views more  JTAER 2010»
15 years 1 months ago
Developing Trust In Virtual Software Development Teams
Today globally distributed software development has become the norm for many organizations and the popularity of implementing such an approach continues to increase. In these circ...
Valentine Casey