Sciweavers

201 search results - page 20 / 41
» Achieving Privacy in a Federated Identity Management System
Sort
View
PET
2009
Springer
14 years 1 months ago
On the Optimal Placement of Mix Zones
Abstract. In mobile wireless networks, third parties can track the location of mobile nodes by monitoring the pseudonyms used for identiļ¬cation. A frequently proposed solution to...
Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux
ATAL
2007
Springer
13 years 10 months ago
Distributed agent-based air traffic flow management
Air traffic flow management is one of the fundamental challenges facing the Federal Aviation Administration (FAA) today. The FAA estimates that in 2005 alone, there were over 322,...
Kagan Tumer, Adrian K. Agogino
DRM
2009
Springer
14 years 1 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacriļ¬...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...
ICC
2007
IEEE
214views Communications» more  ICC 2007»
14 years 1 months ago
Distributed ONS and its Impact on Privacy
ā€” The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
CCS
2003
ACM
13 years 12 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate ā€œstepping stonesā€ to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves