Sciweavers

2454 search results - page 127 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ASSETS
2006
ACM
15 years 7 months ago
Wireless headset communications for vision impaired persons in multi-User environments
Wireless headsets are a great asset to Vision Impaired Persons (VIP’s) as they prove to be much easier to use and reliable than wired equivalents. Radio based wireless headsets ...
Iain Murray, Andrew Pasquale
ACSAC
2000
IEEE
15 years 6 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
CAISE
2003
Springer
15 years 6 months ago
A Shared-Context Information Workspace to Support Knowledge Processes
Knowledge workers typically collaborate in knowledge processes and have to be supported with adequate information and communication infrastructures. We propose a shared-context inf...
Ronald Maier, Johannes Sametinger
CEAS
2004
Springer
15 years 5 months ago
Managing Customer Opt-Outs in a Complex Global Environment
The day to day rhetoric associated with spam control focuses on measures, technology, rules or fees to impose order or control. These efforts concentrate on the broad range of mess...
Matt Leonard, Mayra Rodriguez, Richard Segal, Robe...
DAWAK
2007
Springer
15 years 7 months ago
Computing Join Aggregates over Private Tables
We propose a privacy-preserving protocol for computing aggregation queries over the join of private tables. In this problem, several parties wish to share aggregated information ov...
Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu