Sciweavers

1045 search results - page 13 / 209
» On the Security of Digital Tachographs
Sort
View
CCS
2010
ACM
14 years 2 months ago
A game theoretic model for digital identity and trust in online communities
Digital identity and trust management mechanisms play an important role on the Internet. They help users make decisions on trustworthiness of digital identities in online communit...
Tansu Alpcan, Cengiz Örencik, Albert Levi, Er...
DIAU
2000
Springer
13 years 12 months ago
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, u...
Andreas Pfitzmann, Marit Köhntopp
ACSAC
2003
IEEE
14 years 24 days ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
ASIACRYPT
2003
Springer
14 years 22 days ago
Generalized Powering Functions and Their Application to Digital Signatures
This paper investigates some modular powering functions suitable for cryptography. It is well known that the Rabin encryption function is a 4-to-1 mapping and breaking its one-wayn...
Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Ka...
DRM
2007
Springer
14 years 1 months ago
Digital rights management: desirable, inevitable, and almost irrelevant
provides a very brief overview of some of the main points. References are given to my papers, where those points are explained in more detail, and citations are provided to the ext...
Andrew M. Odlyzko