Results 1 - 10
of
162,350
Purpose of Collection: Intended recipients:
"... You may use this form to apply to Council for internal review of a decision made under the Government Information (Public Access) Act 2009. How to complete this form 1: Ensure that all fields have been filled out correctly. 2: Please note that fields on this form marked with an * are mandatory and ..."
Abstract
- Add to MetaCart
You may use this form to apply to Council for internal review of a decision made under the Government Information (Public Access) Act 2009. How to complete this form 1: Ensure that all fields have been filled out correctly. 2: Please note that fields on this form marked with an * are mandatory and must be completed before submitting the application. 3: Once completed you can submit this form by mail, email or in person. Please refer to the lodgement details section for further information. 4: You must lodge this form within 20 working days after notice of the decision was given to you. 5: Pay $40.00 fee for internal review application (normally applicable).
A New Designated Confirmer Signature Variant with Intended Recipient
, 2004
"... Previous designated confirmer signature schemes were less e#cient because complex zero-knowledge proof employed in confirmation and disavowal protocol. In this paper, we propose a new e#cient signature scheme which is recipient-specific and confirmer-specific. The new scheme is transformed from ID-b ..."
Abstract
- Add to MetaCart
Previous designated confirmer signature schemes were less e#cient because complex zero-knowledge proof employed in confirmation and disavowal protocol. In this paper, we propose a new e#cient signature scheme which is recipient-specific and confirmer-specific. The new scheme is transformed from ID
How to leak a secret
- PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON THE THEORY AND APPLICATION OF CRYPTOLOGY AND INFORMATION SECURITY: ADVANCES IN CRYPTOLOGY
, 2001
"... In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signature. Unlike group signatures, ring signatures have no group managers, no setup procedures, no revocation procedures, and ..."
Abstract
-
Cited by 2508 (4 self)
- Add to MetaCart
email in a way which can only be verified by its intended recipient, and to solve other problems in multiparty computations. The main contribution of this paper is a new construction of such signatures which is unconditionally signer-ambiguous, provably secure in the random oracle model
Effective Erasure Codes for Reliable Computer Communication Protocols
, 1997
"... Reliable communication protocols require that all the intended recipients of a message receive the message intact. Automatic Repeat reQuest (ARQ) techniques are used in unicast protocols, but they do not scale well to multicast protocols with large groups of receivers, since segment losses tend to b ..."
Abstract
-
Cited by 473 (14 self)
- Add to MetaCart
Reliable communication protocols require that all the intended recipients of a message receive the message intact. Automatic Repeat reQuest (ARQ) techniques are used in unicast protocols, but they do not scale well to multicast protocols with large groups of receivers, since segment losses tend
Using collaborative filtering to weave an information tapestry
- Communications of the ACM
, 1992
"... predicated on the belief that information filtering can be more effective when humans are involved in the filtering process. Tapestry was designed to support both content-based filtering and collaborative filtering, which entails people collaborating to help each other perform filtering by recording ..."
Abstract
-
Cited by 945 (4 self)
- Add to MetaCart
by recording their reactions to documents they read. The reactions are called annotations; they can be accessed by other people’s filters. Tapestry is intended to handle any incoming stream of electronic documents and serves both as a mail filter and repository; its components are the indexer, document store
Principled design of the modern web architecture
- ACM Trans. Internet Techn
"... The World Wide Web has succeeded in large part because its software architecture has been designed to meet the needs of an Internet-scale distributed hypermedia system. The modern Web architecture emphasizes scalability of component interactions, generality of interfaces, independent deployment of c ..."
Abstract
-
Cited by 507 (14 self)
- Add to MetaCart
deployed Web architecture in order to elicit mismatches between the existing protocols and the applications they are intended to support.
Data Security
, 1979
"... The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and ..."
Abstract
-
Cited by 611 (3 self)
- Add to MetaCart
of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.
Protecting respondents’ identities in microdata release
- In IEEE Transactions on Knowledge and Data Engineering (TKDE
, 2001
"... Today’s globally networked society places great demand on the dissemination and sharing of information. While in the past released information was mostly in tabular and statistical form, many situations call today for the release of specific data (microdata). In order to protect the anonymity of the ..."
Abstract
-
Cited by 503 (32 self)
- Add to MetaCart
, and ZIP code, that can be linked to publicly available information to re-identify respondents and inferring information that was not intended for disclosure. In this paper we address the problem of releasing microdata while safeguarding the anonymity of the respondents to which the data refer
Security Architecture for the Internet Protocol
- RFC 1825
, 1995
"... Content-Type: text/plain ..."
A survey of context-aware mobile computing research
, 2000
"... Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information (such as user location, time of day, nearby people and devices, and user activity). Since it was proposed about a decade ago, many researchers have studied this topi ..."
Abstract
-
Cited by 683 (2 self)
- Add to MetaCart
Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information (such as user location, time of day, nearby people and devices, and user activity). Since it was proposed about a decade ago, many researchers have studied this topic and built several context-aware applications to demonstrate the usefulness of this new technology. Context-aware applications (or the system infrastructure to support them), however, have never been widely available to everyday users. In this survey of research on context-aware systems and applications, we looked in depth at the types of context used and models of context information, at systems that support collecting and disseminating context, and at applications that adapt to the changing context. Through this survey, it is clear that context-aware research is an old but rich area for research. The difficulties and possible solutions we outline serve as guidance for researchers hoping to make context-aware computing a reality. 1.
Results 1 - 10
of
162,350