Sciweavers

2108 search results - page 291 / 422
» Encrypted
Sort
View
ESORICS
2010
Springer
15 years 3 months ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...
90
Voted
CCS
2010
ACM
15 years 2 months ago
Efficient provable data possession for hybrid clouds
Provable data possession is a technique for ensuring the integrity of data in outsourcing storage service. In this paper, we propose a cooperative provable data possession scheme ...
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Ho...
135
Voted
CCS
2010
ACM
15 years 2 months ago
User-friendly matching protocol for online social networks
In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in use...
Qiang Tang
116
Voted
ICEBE
2007
IEEE
123views Business» more  ICEBE 2007»
15 years 2 months ago
Practical Access Control Management for Outsourced EPC-related Data in RFID-enabled Supply Chain
To reduce deployment and maintenance costs companies often decide to outsource parts of RFID infrastructure to an external application service provider. In scenarios where outsour...
Sergei Evdokimov, Oliver Günther
CORR
2010
Springer
83views Education» more  CORR 2010»
15 years 2 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak