Sciweavers

2656 search results - page 73 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
HICSS
2010
IEEE
187views Biometrics» more  HICSS 2010»
15 years 6 months ago
Engaging the Periphery for Visual Communication on Mobile Phones
While mobile phones have become ubiquitous instruments of communication and social interaction, they still require explicit interaction, placing high demands on attention. Engagin...
Lisa Cowan, William G. Griswold, Louise Barkhuus, ...
ESORICS
2007
Springer
15 years 6 months ago
Fragmentation and Encryption to Enforce Privacy in Data Storage
Abstract. Privacy requirements have an increasing impact on the realization of modern applications. Technical considerations and many significant commercial and legal regulations ...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
KES
2008
Springer
14 years 10 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
IAJIT
2010
157views more  IAJIT 2010»
14 years 10 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
PERCOM
2010
ACM
14 years 10 months ago
The ADAMO project: Architecture to support communication for emergency services
—When emergency services are in a crisis situation, one of their major needs is to have efficient communication. Every person involved needs to have the most up-to-date and rele...
Johan Bergs, Dries Naudts, Nik Van den Wijngaert, ...