Sciweavers

1573 search results - page 119 / 315
» Strong User Authentication
Sort
View
USS
2010
14 years 7 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
CEAS
2005
Springer
15 years 3 months ago
Automatic Discovery of Personal Topics to Organize Email
We present in this paper a procedure to automatically discover a user s personal topics by clustering their emails. Unlike previous work, we automatically label topics using appro...
Arun C. Surendran, John C. Platt, Erin Renshaw
ICDCSW
2008
IEEE
15 years 4 months ago
Towards Cyber-Physical Holodeck Systems Via Physically Rendered Environments (PRE's)
We present an early vision of a cyber-physical environment in which computer controlled rendering of physical surfaces, terrains, and environments is achieved by manipulating grid...
Veljko Krunic, Richard Han
PODC
2010
ACM
15 years 1 months ago
Brief announcement: anonymity and trust in distributed systems
In this paper, we present a framework for achieving anonymity and trust, two seemingly contradictory properties, in distributed systems. Our approach builds on webs of trust, a we...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
DBSEC
2003
149views Database» more  DBSEC 2003»
14 years 11 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...