Sciweavers

318 search results - page 32 / 64
» How to Leak a Secret
Sort
View
CSFW
2012
IEEE
11 years 10 months ago
Verifying Privacy-Type Properties in a Modular Way
—Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkabili...
Myrto Arapinis, Vincent Cheval, Stéphanie D...
CCS
2008
ACM
13 years 9 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
WPES
2005
ACM
14 years 1 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
VLDB
2007
ACM
108views Database» more  VLDB 2007»
14 years 7 months ago
Time Series Compressibility and Privacy
In this paper we study the trade-offs between time series compressibility and partial information hiding and their fundamental implications on how we should introduce uncertainty ...
Spiros Papadimitriou, Feifei Li, George Kollios, P...
EWCBR
2004
Springer
14 years 28 days ago
Facilitating CBR for Incompletely-Described Cases: Distance Metrics for Partial Problem Descriptions
A fundamental problem for case-based reasoning systems is how to select relevant prior cases. Numerous strategies have been developed for determining the similarity of prior cases,...
Steven Bogaerts, David B. Leake