Sciweavers

2846 search results - page 449 / 570
» Personalization of a Trust Network
Sort
View
121
Voted
CEAS
2008
Springer
15 years 2 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
PET
2010
Springer
15 years 2 months ago
Achieving Efficient Query Privacy for Location Based Services
Mobile smartphone users frequently need to search for nearby points of interest from a location based service, but in a way that preserves the privacy of the users' locations...
Femi G. Olumofin, Piotr K. Tysowski, Ian Goldberg,...
ISSA
2008
15 years 2 months ago
Spam Over Internet Telephony and How to Deal with it
In our modern society telephony has developed to an omnipresent service. People are available at anytime and anywhere. Furthermore the Internet has emerged to an important communi...
Rachid El Khayari, Nicolai Kuntze, Andreas U. Schm...
USENIX
2004
15 years 2 months ago
REX: Secure, Extensible Remote Execution
The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. As remote execution tools grow in popularity, users require new features and exten...
Michael Kaminsky, Eric Peterson, Daniel B. Giffin,...
105
Voted
AAAI
1997
15 years 2 months ago
PST: The Provider Selection Tool
Oxford Health Plans, Inc. is a managed care organization whose goal is to deliver cost-effective, high-quality health care. Oxford’s product lines include traditional health mai...
Howard Marmorstein, Jayesh Ghia, Sandeep Sathaye, ...