Sciweavers

242 search results - page 35 / 49
» Private Information Retrieval Using Trusted Hardware
Sort
View
78
Voted
NDSS
2008
IEEE
15 years 3 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
WWW
2007
ACM
15 years 10 months ago
Brand awareness and the evaluation of search results
We investigate the effect of search engine brand (i.e., the identifying name or logo that distinguishes a product from its competitors) on evaluation of system performance. This r...
Bernard J. Jansen, Mimi Zhang, Ying Zhang
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
14 years 11 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
DIM
2007
ACM
15 years 1 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
ISWC
2002
IEEE
15 years 2 months ago
Wearable Sensing to Annotate Meeting Recordings
We propose to use wearable computers and sensor systems to generate personal contextual annotations in audio visual recordings of meetings. In this paper we argue that such annota...
Nicky Kern, Gerhard Tröster, Bernt Schiele, H...