Sciweavers

5255 search results - page 14 / 1051
» Formal Methods for Privacy
Sort
View
CCS
2001
ACM
14 years 5 days ago
Inductive methods and contract-signing protocols
Rohit Chadha, Max I. Kanovich, Andre Scedrov
SAFECOMP
1999
Springer
13 years 12 months ago
Choosing Effective Methods for Design Diversity - How to Progress from Intuition to Science
Peter T. Popov, Lorenzo Strigini, Alexander B. Rom...
ESORICS
2010
Springer
13 years 8 months ago
Formal Analysis of Privacy for Vehicular Mix-Zones
Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehic...
Morten Dahl, Stéphanie Delaune, Graham Stee...
PERVASIVE
2005
Springer
14 years 1 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik