• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 162,350
Next 10 →

Purpose of Collection: Intended recipients:

by Email Address, Contact Number, Postal Address
"... You may use this form to apply to Council for internal review of a decision made under the Government Information (Public Access) Act 2009. How to complete this form 1: Ensure that all fields have been filled out correctly. 2: Please note that fields on this form marked with an * are mandatory and ..."
Abstract - Add to MetaCart
You may use this form to apply to Council for internal review of a decision made under the Government Information (Public Access) Act 2009. How to complete this form 1: Ensure that all fields have been filled out correctly. 2: Please note that fields on this form marked with an * are mandatory and must be completed before submitting the application. 3: Once completed you can submit this form by mail, email or in person. Please refer to the lodgement details section for further information. 4: You must lodge this form within 20 working days after notice of the decision was given to you. 5: Pay $40.00 fee for internal review application (normally applicable).

A New Designated Confirmer Signature Variant with Intended Recipient

by Yong Li, Dingyi Pei , 2004
"... Previous designated confirmer signature schemes were less e#cient because complex zero-knowledge proof employed in confirmation and disavowal protocol. In this paper, we propose a new e#cient signature scheme which is recipient-specific and confirmer-specific. The new scheme is transformed from ID-b ..."
Abstract - Add to MetaCart
Previous designated confirmer signature schemes were less e#cient because complex zero-knowledge proof employed in confirmation and disavowal protocol. In this paper, we propose a new e#cient signature scheme which is recipient-specific and confirmer-specific. The new scheme is transformed from ID

How to leak a secret

by Ronald L. Rivest, Adi Shamir, Yael Tauman - PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON THE THEORY AND APPLICATION OF CRYPTOLOGY AND INFORMATION SECURITY: ADVANCES IN CRYPTOLOGY , 2001
"... In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signature. Unlike group signatures, ring signatures have no group managers, no setup procedures, no revocation procedures, and ..."
Abstract - Cited by 2508 (4 self) - Add to MetaCart
email in a way which can only be verified by its intended recipient, and to solve other problems in multiparty computations. The main contribution of this paper is a new construction of such signatures which is unconditionally signer-ambiguous, provably secure in the random oracle model

Effective Erasure Codes for Reliable Computer Communication Protocols

by Luigi Rizzo , 1997
"... Reliable communication protocols require that all the intended recipients of a message receive the message intact. Automatic Repeat reQuest (ARQ) techniques are used in unicast protocols, but they do not scale well to multicast protocols with large groups of receivers, since segment losses tend to b ..."
Abstract - Cited by 473 (14 self) - Add to MetaCart
Reliable communication protocols require that all the intended recipients of a message receive the message intact. Automatic Repeat reQuest (ARQ) techniques are used in unicast protocols, but they do not scale well to multicast protocols with large groups of receivers, since segment losses tend

Using collaborative filtering to weave an information tapestry

by David Goldberg, David Nichols, Brian M. Oki, Douglas Terry - Communications of the ACM , 1992
"... predicated on the belief that information filtering can be more effective when humans are involved in the filtering process. Tapestry was designed to support both content-based filtering and collaborative filtering, which entails people collaborating to help each other perform filtering by recording ..."
Abstract - Cited by 945 (4 self) - Add to MetaCart
by recording their reactions to documents they read. The reactions are called annotations; they can be accessed by other people’s filters. Tapestry is intended to handle any incoming stream of electronic documents and serves both as a mail filter and repository; its components are the indexer, document store

Principled design of the modern web architecture

by Roy T. Fielding, Richard N. Taylor - ACM Trans. Internet Techn
"... The World Wide Web has succeeded in large part because its software architecture has been designed to meet the needs of an Internet-scale distributed hypermedia system. The modern Web architecture emphasizes scalability of component interactions, generality of interfaces, independent deployment of c ..."
Abstract - Cited by 507 (14 self) - Add to MetaCart
deployed Web architecture in order to elicit mismatches between the existing protocols and the applications they are intended to support.

Data Security

by Dorothy E. Denning, Peter J. Denning , 1979
"... The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and ..."
Abstract - Cited by 611 (3 self) - Add to MetaCart
of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.

Protecting respondents’ identities in microdata release

by Pierangela Samarati - In IEEE Transactions on Knowledge and Data Engineering (TKDE , 2001
"... Today’s globally networked society places great demand on the dissemination and sharing of information. While in the past released information was mostly in tabular and statistical form, many situations call today for the release of specific data (microdata). In order to protect the anonymity of the ..."
Abstract - Cited by 503 (32 self) - Add to MetaCart
, and ZIP code, that can be linked to publicly available information to re-identify respondents and inferring information that was not intended for disclosure. In this paper we address the problem of releasing microdata while safeguarding the anonymity of the respondents to which the data refer

Security Architecture for the Internet Protocol

by Randall Atkinson - RFC 1825 , 1995
"... Content-Type: text/plain ..."
Abstract - Cited by 1738 (15 self) - Add to MetaCart
Content-Type: text/plain

A survey of context-aware mobile computing research

by Guanling Chen, David Kotz , 2000
"... Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information (such as user location, time of day, nearby people and devices, and user activity). Since it was proposed about a decade ago, many researchers have studied this topi ..."
Abstract - Cited by 683 (2 self) - Add to MetaCart
Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information (such as user location, time of day, nearby people and devices, and user activity). Since it was proposed about a decade ago, many researchers have studied this topic and built several context-aware applications to demonstrate the usefulness of this new technology. Context-aware applications (or the system infrastructure to support them), however, have never been widely available to everyday users. In this survey of research on context-aware systems and applications, we looked in depth at the types of context used and models of context information, at systems that support collecting and disseminating context, and at applications that adapt to the changing context. Through this survey, it is clear that context-aware research is an old but rich area for research. The difficulties and possible solutions we outline serve as guidance for researchers hoping to make context-aware computing a reality. 1.
Next 10 →
Results 1 - 10 of 162,350
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University