Sciweavers

131 search results - page 13 / 27
» A Privacy-Protecting Coupon System
Sort
View
OOPSLA
1992
Springer
13 years 11 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
WIMOB
2008
IEEE
14 years 1 months ago
Random Beacon for Privacy and Group Security
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg
PAKM
2008
13 years 9 months ago
The Right Expert at the Right Time and Place
Abstract. We propose a unified and complete solution for expert finding in organizations, including not only expertise identification, but also expertise selection functionality. T...
Pavel Serdyukov, Ling Feng, Arthur H. van Bunninge...
JCP
2006
135views more  JCP 2006»
13 years 7 months ago
Improved Double Auction Protocol based on a Hybrid Trust Model
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
JungHoon Ha, Jianying Zhou, Sang-Jae Moon
JSAC
2006
100views more  JSAC 2006»
13 years 7 months ago
RFID security and privacy: a research survey
This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help iden...
Ari Juels