Sciweavers

1790 search results - page 232 / 358
» On Privacy Models for RFID
Sort
View
SAFECOMP
2005
Springer
15 years 9 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
HT
2004
ACM
15 years 9 months ago
Managing conflict in multi-model adaptive hypertext
Adaptive hypermedia has the goal of contextualizing the display of a hypertext to suit the user and their situation. A variety of aspects of the context can influence the appropri...
Luis Francisco-Revilla, Frank M. Shipman III
MDM
2007
Springer
125views Communications» more  MDM 2007»
15 years 10 months ago
Extending P3P/Appel for Friend Finder
FriendFinder as a location-based service collects location data from mobile users and distributes a particular user’s location upon request. Privacy of users data especially loc...
Emin Islam Tatli
LATINCRYPT
2010
15 years 2 months ago
Mediated Traceable Anonymous Encryption
the full version of the extended abstract which appears in Latincrypt '10 (august 8-11, 2010, Puebla, Mexico) M. Abdalla and P. Barreto Eds., Springer-Verlag, LNCS 6212, pages...
Malika Izabachène, David Pointcheval, Damie...
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 11 months ago
Distributed Private Data Analysis: On Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs – secure function evaluation (SFE) and differential...
Amos Beimel, Kobbi Nissim, Eran Omri