Sciweavers

1663 search results - page 122 / 333
» Privacy and Identity Management
Sort
View
115
Voted
WPES
2004
ACM
15 years 10 months ago
Soft blocking: flexible blocker tags on the cheap
A “blocker” tag is a form of privacy-enhancing radio-frequency identification (RFID) tag. It operates by interfering with the protocol in which a reader communicates individua...
Ari Juels, John G. Brainard
111
Voted
CCS
2010
ACM
15 years 11 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
15 years 11 months ago
Fingerprinting Blank Paper Using Commodity Scanners
This paper presents a novel technique for authenticating physical documents based on random, naturally occurring imperfections in paper texture. We introduce a new method for meas...
William Clarkson, Tim Weyrich, Adam Finkelstein, N...
ACISP
2007
Springer
15 years 10 months ago
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users
We propose the first single sign-on system in which a user can access services using unlinkable digital pseudonyms that can all be revoked in case she abuses any one service. Our ...
Stefan Brands, Liesje Demuynck, Bart De Decker
126
Voted
CCS
2007
ACM
15 years 10 months ago
New constructions of fuzzy identity-based encryption
In this paper we construct two new fuzzy identity-based encryption (IBE) schemes in the random oracle model. Not only do our schemes provide public parameters whose size is indepe...
Joonsang Baek, Willy Susilo, Jianying Zhou