Sciweavers

1790 search results - page 313 / 358
» On Privacy Models for RFID
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 1 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
152
Voted
PERCOM
2011
ACM
14 years 7 months ago
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution
—In this paper, we propose P3 -coupon, a Prompt and Privacy-preserving electronic coupon distribution system based on a Probabilistic one-ownership forwarding algorithm. In this ...
Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang, D...
191
Voted
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
14 years 7 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
CHI
2011
ACM
14 years 7 months ago
HyperSource: bridging the gap between source and code-related web sites
Programmers frequently use the Web while writing code: they search for libraries, code examples, tutorials, and documentation. This link between code and visited Web pages remains...
Björn Hartmann, Mark Dhillon, Matthew K. Chan
145
Voted
CHI
2011
ACM
14 years 7 months ago
Exploring reactive access control
As users store and share more digital content at home, access control becomes increasingly important. One promising approach for helping non-expert users create accurate access po...
Michelle L. Mazurek, Peter F. Klemperer, Richard S...