Sciweavers

243 search results - page 4 / 49
» Addressing privacy issues in CardSpace
Sort
View
CSI
2008
68views more  CSI 2008»
13 years 7 months ago
Privacy and forensics investigation process: The ERPINA protocol
The rights of an Internet user acting anonymously conflicts with the rights of a Server victim identifying the malicious user. The ERPINA protocol, introduced in this paper, allow...
Giannakis Antoniou, Leon Sterling, Stefanos Gritza...
ISSA
2004
13 years 8 months ago
Intrinsic Legal Issues In It Security
E-commerce is a rapidly expanding sector all over the world. While this is apparently good news to the world's consumers and business companies, it is creating big challenges...
Respickius Casmir
ACSAC
2005
IEEE
14 years 20 days ago
TARP: Ticket-based Address Resolution Protocol
IP networks fundamentally rely on the Address Resolution Protocol (ARP) for proper operation. Unfortunately, vulnerabilities in the ARP protocol enable a raft of IP-based imperson...
Wesam Lootah, William Enck, Patrick McDaniel
CIKM
2008
Springer
13 years 9 months ago
Vanity fair: privacy in querylog bundles
A recently proposed approach to address privacy concerns in storing web search querylogs is bundling logs of multiple users together. In this work we investigate privacy leaks tha...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
WCE
2007
13 years 8 months ago
A Brief Survey on RFID Privacy and Security
Abstract— In this survey we take a look at different approaches proposed in the literature for addressing the privacy and security issues derived from the Radio-Frequency IDenti...
J. Aragones-Vilella, Antoni Martínez-Balles...