Sciweavers

650 search results - page 46 / 130
» Privacy in Non-private Environments
Sort
View
SP
2002
IEEE
114views Security Privacy» more  SP 2002»
14 years 9 months ago
HMM-based techniques for speech segments extraction
The goal of the speech segments extraction process is to separate acoustic events of interest (the speech segment to be recognised) in a continuously recorded signal from other par...
Waleed H. Abdulla
CSREASAM
2009
14 years 7 months ago
A Secure Certificate for Secure Group Communication
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Sunghyuck Hong
ISSE
2011
14 years 4 months ago
Time-triggered buffers for event-based middleware systems
Application developers utilizing event-based middleware have sought to leverage domain-specific modeling for the advantages of intuitive specification, code synthesis, and suppo...
Jonathan Sprinkle, Brandon Eames

Publication
243views
16 years 9 months ago
Enabling Private Continuous Queries For Revealed User Locations
Existing location-based services provide specialized services to their customers based on the knowledge of their exact locations. With untrustworthy servers, location-based service...
Chi-Yin Chow, Mohamed F. Mokbel
CCS
2005
ACM
15 years 3 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash