Sciweavers

738 search results - page 32 / 148
» Privacy Protection for Speech Information
Sort
View
ESORICS
2009
Springer
14 years 4 months ago
Towards a Privacy-Preserving National Identity Card
In this paper, we propose to replace the national identity card, currently used in many countries, by a personal device that allows its user to prove some binary statements about h...
Yves Deswarte, Sébastien Gambs
EUC
2004
Springer
14 years 2 months ago
Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags
A Radio-Frequency-Identification (RFID) tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. It emits an ID in response to a query...
Junichiro Saito, Jae-Cheol Ryou, Kouichi Sakurai
SOUPS
2009
ACM
14 years 3 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov
ACISP
2000
Springer
14 years 1 months ago
Cryptanalysis of the m-Permutation Protection Schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP'98, Fung and Gray proposed an −m permutation protecti...
Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
ACSAC
2007
IEEE
14 years 1 months ago
Toward a Medium-Robustness Separation Kernel Protection Profile
A protection profile for high-robustness separation kernels has recently been validated and several implementations are under development. However, medium-robustness separation ke...
Rance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine...