Sciweavers

3299 search results - page 530 / 660
» Privacy and Trusted Computing
Sort
View
WWW
2005
ACM
16 years 5 months ago
A language for expressing user-context preferences in the web
In this paper, we introduce WPML (WebProfiles Markup Language) for expressing user-context preferences information in the Web. Using WPML a service provider can negotiate and obta...
Diego López de Ipiña, Juan Ignacio V...
WWW
2004
ACM
16 years 5 months ago
Filtering spam e-mail on a global scale
In this paper we analyze a very large junk e-mail corpus which was generated by a hundred thousand volunteer users of the Hotmail e-mail service. We describe how the corpus is bei...
Geoff Hulten, Joshua T. Goodman, Robert Rounthwait...
CHI
2003
ACM
16 years 4 months ago
Intuitive visualizations for presence and recency information for ambient displays
The Semi-Public Displays project utilizes public displays to assist in the interactions of small groups. This paper describes a set of visualizations for presence information of g...
Jaroslav Tyman, Elaine M. Huang
DCC
2005
IEEE
16 years 3 months ago
Signcryption with Non-interactive Non-repudiation
Signcryption [35] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a...
John Malone-Lee
SAC
2010
ACM
15 years 11 months ago
Nudge: intermediaries' role in interdependent network security
ombiners for Software Hardening - Extended Abstract (Short Paper) Amir Herzberg and Haya Shulman (Bar Ilan University) The PUF Promise (Short Paper) Heike Busch and Miroslava Sotak...
Jens Grossklags, Svetlana Radosavac, Alvaro A. C&a...