Sciweavers

2454 search results - page 245 / 491
» Privacy in the Information and Communications Technologies
Sort
View
INFOCOM
2010
IEEE
15 years 10 days ago
Fuzzy Keyword Search over Encrypted Data in Cloud Computing
—As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have t...
Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, W...
119
Voted
CORR
2011
Springer
156views Education» more  CORR 2011»
14 years 5 months ago
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
: Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most o...
Anjan K., Jibi Abraham, Mamatha Jadhav V.
112
Voted
IH
1998
Springer
15 years 6 months ago
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects....
Fabien A. P. Petitcolas, Ross J. Anderson, Markus ...
82
Voted
DIGITALCITIES
2000
Springer
15 years 6 months ago
Extending the Services and the Accessibility of Community Networks
Community networks are community-oriented information and communication systems that are generally patterned after the public library’s model of free, inclusive service and commi...
Antonietta Grasso, Dave Snowdon, Michael Koch
SIGIR
2008
ACM
15 years 1 months ago
Algorithmic mediation for collaborative exploratory search
We describe a new approach to information retrieval: algorithmic mediation for intentional, synchronous collaborative exploratory search. Using our system, two or more users with ...
Jeremy Pickens, Gene Golovchinsky, Chirag Shah, Pe...