Sciweavers

1573 search results - page 187 / 315
» Strong User Authentication
Sort
View
132
Voted
SAINT
2008
IEEE
15 years 8 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
122
Voted
SAINT
2007
IEEE
15 years 8 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner
114
Voted
OTM
2007
Springer
15 years 8 months ago
Personalized Information Access in a Wiki Using Structured Tagging
Environmental engineers from different organizations work in interdisciplinary projects having the need of information exchange. In particular, a collaborative environment with pe...
Anmol V. Singh, Andreas Wombacher, Karl Aberer
103
Voted
ICDM
2005
IEEE
126views Data Mining» more  ICDM 2005»
15 years 7 months ago
Segment-Based Injection Attacks against Collaborative Filtering Recommender Systems
Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. Researchers have shown that attackers can manipulate a system’s reco...
Robin D. Burke, Bamshad Mobasher, Runa Bhaumik, Ch...
EGC
2005
Springer
15 years 7 months ago
Interactive Visualization of Grid Monitoring Data on Multiple Client Platforms
Most current Grid monitoring systems provide a visual user interface. With recent advances in multimedia capabilities in user terminals, there is a strong trend towards interactive...
Lea Skorin-Kapov, Igor S. Pandzic, Maja Matijasevi...