Sciweavers

744 search results - page 87 / 149
» The Traust Authorization Service
Sort
View
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
15 years 2 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander
DOCENG
2007
ACM
15 years 1 months ago
A model for mapping between printed and digital document instances
The first steps towards bridging the paper-digital divide have been achieved with the development of a range of technologies that allow printed documents to be linked to digital c...
Nadir Weibel, Moira C. Norrie, Beat Signer
FC
2010
Springer
188views Cryptology» more  FC 2010»
15 years 1 months ago
Building Incentives into Tor
Abstract. Distributed anonymous communication networks like Tor depend on volunteers to donate their resources. However, the efforts of Tor volunteers have not grown as fast as th...
Tsuen-Wan Ngan, Roger Dingledine, Dan S. Wallach
SIGIR
2010
ACM
15 years 1 months ago
Short text classification in twitter to improve information filtering
In microblogging services such as Twitter, the users may become overwhelmed by the raw data. One solution to this problem is the classification of short text messages. As short te...
Bharath Sriram, Dave Fuhry, Engin Demir, Hakan Fer...
CCGRID
2004
IEEE
15 years 1 months ago
A hardware-secured credential repository for Grid PKIs
Public Key Infrastructures suffer from usability and security problems associated with the request for and secure management of end user credentials. Online credential repositorie...
Markus Lorch, Jim Basney, Dennis G. Kafura