Sciweavers

1573 search results - page 132 / 315
» Strong User Authentication
Sort
View
181
Voted
SIGMOD
2005
ACM
103views Database» more  SIGMOD 2005»
16 years 2 months ago
Verifying Completeness of Relational Query Results in Data Publishing
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be untrusted or susceptible to attacks, it could produ...
HweeHwa Pang, Arpit Jain, Krithi Ramamritham, Kian...
TEI
2009
ACM
92views Hardware» more  TEI 2009»
15 years 8 months ago
TinkerSheets: using paper forms to control and visualize tangible simulations
This paper describes TinkerSheets, a paper-based interface to tangible simulations. The proposed interface combines the advantages of form-based input and paper. Form-based input ...
Guillaume Zufferey, Patrick Jermann, Auréli...
110
Voted
HICSS
2008
IEEE
137views Biometrics» more  HICSS 2008»
15 years 8 months ago
Marketing Using Web 2.0
The increasing popularity of Web 2.0 tools, such as blogs, wikis, and virtual worlds, is fundamentally changing how consumers use the Web. The basic core of Web 2.0, that users ca...
Salvatore Parise, Patricia J. Guinan
104
Voted
IEEEIAS
2007
IEEE
15 years 8 months ago
Addressing privacy issues in CardSpace
CardSpace (formerly known as InfoCard) is a Digital Identity Management system that has recently been adopted by Microsoft. In this paper we identify two security flaws in CardSp...
Waleed A. Alrodhan, Chris J. Mitchell
94
Voted
AINA
2006
IEEE
15 years 8 months ago
Dual RSA Accumulators and Its Application for Private Revocation Check
This paper points out the privacy issue in the OCSP (Online Certificate Status Protocol), namely, the OCSP responder learns confidential information – who sends a message to w...
Hiroaki Kikuchi