Sciweavers

818 search results - page 70 / 164
» An Internet Voting System Supporting User Privacy
Sort
View
IEEEARES
2009
IEEE
14 years 3 months ago
Revealing the Calling History of SIP VoIP Systems by Timing Attacks
Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP s...
Ge Zhang, Simone Fischer-Hübner, Leonardo A. ...
WWW
2010
ACM
14 years 3 months ago
Highlighting disputed claims on the web
We describe Dispute Finder, a browser extension that alerts a user when information they read online is disputed by a source that they might trust. Dispute Finder examines the tex...
Rob Ennals, Beth Trushkowsky, John Mark Agosta
APWEB
2006
Springer
14 years 21 days ago
Tourism Guided Information System for Location-Based Services
Mobile information community develops quickly, as mobile telecommunication technology matches to the third generation. XML-based GIS becomes a global standard and the foundation. R...
Chang-Won Jeong, Yeong-Jee Chung, Su-Chong Joo, Jo...
ESORICS
2006
Springer
14 years 18 days ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
CCS
2004
ACM
14 years 21 days ago
Group signatures with verifier-local revocation
Group signatures have recently become important for enabling privacy-preserving attestation in projects such as Microsoft's ngscb effort (formerly Palladium). Revocation is c...
Dan Boneh, Hovav Shacham