Sciweavers

4445 search results - page 94 / 889
» Reflective Authorization Systems
Sort
View
CCS
2008
ACM
15 years 6 months ago
Black-box accountable authority identity-based encryption
A well-known concern in the setting of identity based encryption is that the PKG is all powerful and has to be completely trusted. To mitigate this problem, the notion of Accounta...
Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters
AVI
2008
15 years 6 months ago
The in-context slider: a fluid interface component for visualization and adjustment of values while authoring
As information environments grow in complexity, we yearn for simple interfaces that streamline human cognition and effort. Users need to perform complex operations on thousands of...
Andrew Webb, Andruid Kerne
CSCW
2008
ACM
15 years 5 months ago
Range: exploring implicit interaction through electronic whiteboard design
An important challenge in designing ubiquitous computing experiences is negotiating transitions between explicit and implicit interaction, such as how and when to provide users wi...
Wendy Ju, Brian A. Lee, Scott R. Klemmer
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
15 years 9 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
ICMCS
2005
IEEE
142views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Telling Stories with Mylifebits
User authored stories will always be the best stories, and authoring tools will continue to be developed. However, a digital lifetime capture permits storytelling via a lightweigh...
Jim Gemmell, Aleks Aris, Roger Lueder