Sciweavers

178 search results - page 29 / 36
» Legal Issues in Cyberspace
Sort
View
SIGUCCS
2004
ACM
15 years 5 months ago
Software's little helpers: managing your lab areas
There are always more labs and other things to attend to than available bodies to watch over said pesky details. How can we keep an eye on the ever-present large and small events ...
Doug Simpson
WPES
2004
ACM
15 years 5 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
ACMICEC
2003
ACM
90views ECommerce» more  ACMICEC 2003»
15 years 5 months ago
Automated analysis of P3P-enabled Web sites
The Platform for Privacy Preferences (P3P) provides a standard computer-readable format for privacy policies and a protocol that enables web browsers to read and process these pol...
Simon Byers, Lorrie Faith Cranor, David P. Kormann
ACSAC
2002
IEEE
15 years 4 months ago
A Secure Directory Service based on Exclusive Encryption
We describe the design of a Windows file-system directory service that ensures the persistence, integrity, privacy, syntactic legality, and case-insensitive uniqueness of the name...
John R. Douceur, Atul Adya, Josh Benaloh, William ...
CLEF
2000
Springer
15 years 4 months ago
The Use of NLP Techniques in CLIR
The application of nlp techniques to improve the results of information retrieval is still considered as a controversial issue, whereas nlp techniques in cross-language informatio...
Bärbel Ripplinger