Sciweavers

515 search results - page 67 / 103
» Measuring Voter-Controlled Privacy
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 4 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...
SP
2007
IEEE
102views Security Privacy» more  SP 2007»
14 years 4 months ago
Improving the Robustness of Private Information Retrieval
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modificati...
Ian Goldberg
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
14 years 2 months ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
CSFW
2008
IEEE
14 years 4 months ago
Security Decision-Making among Interdependent Organizations
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the s...
Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell...
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
14 years 4 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong