Sciweavers

2454 search results - page 198 / 491
» Privacy in the Information and Communications Technologies
Sort
View
DEXAW
2009
IEEE
141views Database» more  DEXAW 2009»
15 years 2 months ago
Improving Practical Performance on Secure and Private Collaborative Linear Programming
Although information sharing in supply chain management dramatically reduces costs, parties are reluctant to do so, mainly due to fear of information leakage. Solutions based on se...
Rafael Deitos, Florian Kerschbaum
SIGUCCS
2004
ACM
15 years 7 months ago
Software's little helpers: managing your lab areas
There are always more labs and other things to attend to than available bodies to watch over said pesky details. How can we keep an eye on the ever-present large and small events ...
Doug Simpson
ICONFERENCE
2012
13 years 9 months ago
Not just a wink and smile: an analysis of user-defined success in online dating
This study examines the publically available stories of selfidentified successful couples that met using the online dating services Match.com, eHarmony, or OkCupid. We enumerate f...
Christopher M. Mascaro, Rachel M. Magee, Sean P. G...
ACSAC
2008
IEEE
15 years 8 months ago
Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint
In February 2002, more than 50 leaders in the information assurance field warned the President of the United States of a national strategic vulnerability in the country’s inform...
O. Sami Saydjari
ITRUST
2005
Springer
15 years 7 months ago
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, th...
Jean-Marc Seigneur, Alan Gray, Christian Damsgaard...