Sciweavers

243 search results - page 19 / 49
» Addressing privacy issues in CardSpace
Sort
View
129
Voted
SOUPS
2009
ACM
15 years 10 months ago
A comparative study of online privacy policies and formats
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...
133
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
SOUPS
2009
ACM
15 years 10 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
IADIS
2003
15 years 5 months ago
E-Technology V E-Law: Legal Challenges to the Information Society
In the area of electronic and mobile commerce there are unique legal risks as well as concerns that apply to traditional businesses. Various laws have been successfully applied to...
Elaine Lawrence, Gordana Culjak, John Lawrence
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
15 years 1 months ago
Efficient Biometric Verification in Encrypted Domain
Biometric authentication over public networks leads to a variety of privacy issues that needs to be addressed before it can become popular. The primary concerns are that the biomet...
Maneesh Upmanyu, Anoop M. Namboodiri, K. Srinathan...