Sciweavers

817 search results - page 60 / 164
» Using Ontology for Personalized Mobile Message Computation
Sort
View
JCP
2006
120views more  JCP 2006»
14 years 11 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
GI
2007
Springer
15 years 3 months ago
User Profile Refinement Using Explicit User Interest Modeling
: In this paper, we present an approach to refine user profiles that were derived from Web server logs in an automated procedure. In most application scenarios, such automatically ...
Gerald Stermsek, Mark Strembeck, Gustaf Neumann
DIM
2007
ACM
15 years 3 months ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
WPES
2003
ACM
15 years 5 months ago
Reusable anonymous return channels
Mix networks are used to deliver messages anonymously to recipients, but do not straightforwardly allow the recipient of an anonymous message to reply to its sender. Yet the abili...
Philippe Golle, Markus Jakobsson
W4A
2006
ACM
15 years 5 months ago
The meaning of 'life': capturing intent from web authors
Interest in accessing the Web from small, mobile devices, such as cell phones, is increasing rapidly. The challenge of delivering content to such devices is similar in many ways t...
Rhys Lewis