Sciweavers

415 search results - page 78 / 83
» A New RFID Privacy Model
Sort
View
ICC
2009
IEEE
130views Communications» more  ICC 2009»
13 years 6 months ago
Verification of Secret Key Generation from UWB Channel Observations
Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third ...
Masoud Ghoreishi Madiseh, Shuai He, Michael L. McG...
BCSHCI
2009
13 years 6 months ago
Personality traits, usage patterns and information disclosure in online communities
Online communities of different types have become an important part of the daily internet life of many people within the last couple of years. Both research and business have show...
Johann Schrammel, Christina Köffel, Manfred T...
EDBT
2009
ACM
145views Database» more  EDBT 2009»
14 years 14 days ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
ATAL
2010
Springer
13 years 8 months ago
Local search for distributed asymmetric optimization
Distributed Constraints Optimization (DCOP) is a powerful framework for representing and solving distributed combinatorial problems, where the variables of the problem are owned b...
Alon Grubshtein, Roie Zivan, Tal Grinshpoun, Amnon...
SACMAT
2009
ACM
14 years 3 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang