Sciweavers

3299 search results - page 567 / 660
» Privacy and Trusted Computing
Sort
View
ICPADS
2010
IEEE
15 years 1 months ago
Utilizing RF Interference to Enable Private Estimation in RFID Systems
Counting or estimating the number of tags is crucial for RFID system. Researchers have proposed several fast cardinality estimation schemes to estimate the quantity of a batch of ...
Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Zhuo L...
CHI
2011
ACM
14 years 7 months ago
Tweets from Justin Bieber's heart: the dynamics of the location field in user profiles
Little research exists on one of the most common, oldest, and most utilized forms of online social geographic information: the “location” field found in most virtual community...
Brent Hecht, Lichan Hong, Bongwon Suh, Ed H. Chi
CCS
2011
ACM
14 years 3 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King
201
Voted
CCS
2011
ACM
14 years 3 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
158
Voted
IACR
2011
158views more  IACR 2011»
14 years 3 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...