Sciweavers

212 search results - page 37 / 43
» Anonymity and k-Choice Identities
Sort
View
ACNS
2008
Springer
172views Cryptology» more  ACNS 2008»
14 years 1 months ago
Traceable Privacy of Recent Provably-Secure RFID Protocols
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
Khaled Ouafi, Raphael C.-W. Phan
SAC
2006
ACM
13 years 7 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
WDAG
2010
Springer
185views Algorithms» more  WDAG 2010»
13 years 5 months ago
Leader Election Problem versus Pattern Formation Problem
Leader election and arbitrary pattern formation are fundammental tasks for a set of autonomous mobile robots. The former consists in distinguishing a unique robot, called the lead...
Yoann Dieudonné, Franck Petit, Vincent Vill...
DIGRA
2005
Springer
14 years 1 months ago
Virtually Visual: The effects of visual technologies on online identification
Identification is regarded as an important aspect of beneficial online interaction. In addition to providing the individual with potential psychological benefits, identification w...
Jennifer Martin
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
14 years 23 days ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier