Sciweavers

3299 search results - page 128 / 660
» Privacy and Trusted Computing
Sort
View
SAC
2008
ACM
15 years 4 months ago
Increasing trust through the use of 3d e-commerce environment
Existing 2D e-commerce internet websites provide users with only relatively simple, browser-based interface to access available products and services. These websites often lack in...
Nasser Nassiri
ICPR
2008
IEEE
16 years 5 months ago
Context aware privacy in visual surveillance
In this paper we present preliminary work implementing dynamic privacy in public surveillance. The aim is to maximise the privacy of those under surveillance, while giving an obse...
Simon Moncrieff, Svetha Venkatesh, Geoff A. W. Wes...
CSCWD
2006
Springer
15 years 8 months ago
A Model to Incorporate Privacy in Organizational Memory Systems
People are usually concerned with the privacy of their personal information. However, the problem of privacy is also present when the information is directly linked to people, for...
Valeria Herskovic, Sergio F. Ochoa, José A....
DSN
2002
IEEE
15 years 9 months ago
Distributed Object Middleware to Support Dependable Information Sharing between Organisations
Organisations increasingly use the Internet to offer their own services and to utilise the services of others. This naturally leads to information sharing across organisational bo...
Nick Cook, Santosh K. Shrivastava, Stuart M. Wheat...
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 2 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen