Sciweavers

1317 search results - page 39 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
IEEEARES
2007
IEEE
15 years 10 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...
ECTEL
2006
Springer
15 years 8 months ago
Finding Communities of Practice from User Profiles Based on Folksonomies
User profiles can be used to identify persons inside a community with similar interests. Folksonomy systems allow users to individually tag the objects of a common set (e.g., web p...
Jörg Diederich, Tereza Iofciu
STORAGESS
2006
ACM
15 years 10 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
15 years 5 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
DIAU
2000
Springer
15 years 8 months ago
Towards an Analysis of Onion Routing Security
This paper presents a security analysis of Onion Routing, an application independent infrastructure for tra c-analysis-resistant and anonymous Internet connections. It also includ...
Paul F. Syverson, Gene Tsudik, Michael G. Reed, Ca...