Sciweavers

1663 search results - page 108 / 333
» Privacy and Identity Management
Sort
View
INFOCOM
2007
IEEE
15 years 10 months ago
Anonymous Tracking Using RFID Tags
Abstract—The increasing use of RFID tags in many applications have brought forth valid concerns of privacy and anonymity among users. One of the primary concerns with RFID tags i...
Murali S. Kodialam, Thyaga Nandagopal, Wing Cheong...
CORR
2010
Springer
139views Education» more  CORR 2010»
15 years 4 months ago
Compromising Tor Anonymity Exploiting P2P Information Leakage
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war be...
Pere Manils, Chaabane Abdelberri, Stevens Le-Blond...
CCS
2001
ACM
15 years 9 months ago
Implications of Digital Rights Management for Online Music - A Business Perspective
This paper will examine and categorize potential business model scenarios for online music. The virtualization of music leads to market uncertainties. On the supply side, the offer...
Willms Buhse
CN
2010
149views more  CN 2010»
15 years 4 months ago
An automatic HTTP cookie management system
HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies hav...
Chuan Yue, Mengjun Xie, Haining Wang
CIKM
2010
Springer
15 years 3 months ago
Preserving location and absence privacy in geo-social networks
Online social networks often involve very large numbers of users who share very large volumes of content. This content is increasingly being tagged with geo-spatial and temporal c...
Dario Freni, Carmen Ruiz Vicente, Sergio Mascetti,...