Sciweavers

1790 search results - page 313 / 358
» On Privacy Models for RFID
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 8 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
PERCOM
2011
ACM
13 years 2 months ago
P3-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution
—In this paper, we propose P3 -coupon, a Prompt and Privacy-preserving electronic coupon distribution system based on a Probabilistic one-ownership forwarding algorithm. In this ...
Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang, D...
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
13 years 2 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
CHI
2011
ACM
13 years 2 months ago
HyperSource: bridging the gap between source and code-related web sites
Programmers frequently use the Web while writing code: they search for libraries, code examples, tutorials, and documentation. This link between code and visited Web pages remains...
Björn Hartmann, Mark Dhillon, Matthew K. Chan
CHI
2011
ACM
13 years 2 months ago
Exploring reactive access control
As users store and share more digital content at home, access control becomes increasingly important. One promising approach for helping non-expert users create accurate access po...
Michelle L. Mazurek, Peter F. Klemperer, Richard S...