Sciweavers

115 search results - page 8 / 23
» Privacy, Security and Trust in P2P environments: A Perspecti...
Sort
View
CCS
2001
ACM
14 years 5 days ago
Secure Open Systems for Protecting Privacy and Digital Services
This paper describes and analyzes a system architecture that enables consumers to access services and content from multiple providers without jeopardizing the privacy interests of...
David W. Kravitz, Kim-Ee Yeoh, Nicol So
WISEC
2010
ACM
14 years 2 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
CIS
2005
Springer
14 years 1 months ago
A New Conceptual Framework Within Information Privacy: Meta Privacy
When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PI...
Geoff Skinner, Song Han, Elizabeth Chang
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
14 years 8 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
TRUST
2010
Springer
13 years 6 months ago
Key Attestation from Trusted Execution Environments
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...