Sciweavers

243 search results - page 15 / 49
» Addressing privacy issues in CardSpace
Sort
View
JCM
2006
112views more  JCM 2006»
13 years 8 months ago
A Secure RFID Identity Reporting Protocol for Physical Attack Resistance
RFID tags will exist pervasively in our daily life in a near future. In RFID systems, privacy and security are of critical importance to avoid potential tracking abuse and privacy ...
Zhaoyu Liu, Dichao Peng
WCNC
2010
IEEE
13 years 11 months ago
V-Tokens for Conditional Pseudonymity in VANETs
—Privacy is an important requirement in vehicle networks, because vehicles broadcast detailed location information. Also of importance is accountability due to safety critical ap...
Florian Schaub, Frank Kargl, Zhendong Ma, Michael ...
ACISP
2006
Springer
13 years 11 months ago
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
In this paper, we propose an efficient multi-receiver identity based signcryption scheme which only needs one pairing computation to signcrypt a message for n receivers and can pro...
Shanshan Duan, Zhenfu Cao
EUROSSC
2006
Springer
13 years 11 months ago
Context-Aware Trust Domains
Context-aware service platforms need to establish and manage trust relationships for users to know if the user's privacy policies are being enforced and for service providers ...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
MOC
2010
13 years 2 months ago
On the convergence of Hill's method
Hill's method is a means to numerically approximate spectra of linear differential operators with periodic coefficients. In this paper, we address different issues related to...
Christopher W. Curtis, Bernard Deconinck