Sciweavers

1663 search results - page 13 / 333
» Privacy and Identity Management
Sort
View
CSCW
2011
ACM
13 years 2 months ago
Faceted identity, faceted lives: social and technical issues with being yourself online
This paper explores key issues people experience managing personal boundaries within and across social technologies. We look in particular at email and online social networks. We ...
Shelly Farnham, Elizabeth F. Churchill
HUC
2005
Springer
14 years 28 days ago
DigiDress: A Field Trial of an Expressive Social Proximity Application
In May 2005 Nokia Sensor application (www.nokia.com/sensor) was launched, allowing mobile phone users to create digital identity expressions, seen by other users within Bluetooth r...
Per Persson, Jan Blom, Younghee Jung
ESORICS
2009
Springer
14 years 2 months ago
Untraceable Tags Based on Mild Assumptions
Radio frequency identification (RFID) chips have been widely deployed in large-scale systems such as inventory control and supply chain management. While RFID technology has much...
Carlo Blundo, Angelo De Caro, Giuseppe Persiano
MOBISEC
2009
Springer
14 years 1 months ago
Extending the Belgian eID Technology with Mobile Security Functionality
The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to prove their identity digitally and to sign electronic documents. Today, only a lim...
Jorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vince...
EUROPKI
2004
Springer
14 years 24 days ago
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
The last years have seen a major interest in designing and deploying trust management and public key infrastructures. Yet, it is still far from clear how one can pass from the orga...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...