My talk about recommendation and search to the Hive
Network Security Notes
Bowling Alone and Trust Decline in Social Network Sites
Towards Mining Semantic Maturity in Social Bookmarking Systems
One Tag to bind them all: Measuring Term abstractness in Social Metadata
1 Cryptography: on the Hope for Privacy in a Digital World Omer Reingold VVeizmann and Harvard CRCS.
GENI Distributed Services Preliminary Requirements and Design Tom Anderson and Amin Vahdat (co-chairs) David Andersen, Mic Bowman, Frans Kaashoek, Arvind.
1 Access Control Today we will start to cover Access Control –material is from Gollmanns Computer Security book (Chapter 3 and partially 4) (most slides.
Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution Zhiyuan Tang, Zhongfa Liao, Feihu Xu, Bing.
CNS2010lecture 6 :: key management1 ELEC5616 computer and network security matt barrie [email protected].
Qkd and de finetti theorem
Digital Signature