Sciweavers

1663 search results - page 140 / 333
» Privacy and Identity Management
Sort
View
IJNSEC
2008
88views more  IJNSEC 2008»
15 years 4 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
INFOCOM
2012
IEEE
13 years 7 months ago
MobiShare: Flexible privacy-preserving location sharing in mobile online social networks
—Location sharing is a fundamental component of mobile online social networks (mOSNs), which also raises significant privacy concerns. The mOSNs collect a large amount of locati...
Wei Wei, Fengyuan Xu, Qun Li
ESORICS
2012
Springer
13 years 7 months ago
Exploring Linkability of User Reviews
Large numbers of people all over the world read and contribute to various review sites. Many contributors are understandably concerned about privacy in general and, specifically,...
Mishari Al Mishari, Gene Tsudik
LATIN
2010
Springer
15 years 6 months ago
Randomized Truthful Algorithms for Scheduling Selfish Tasks on Parallel Machines
We study the problem of designing truthful algorithms for scheduling a set of tasks, each one owned by a selfish agent, to a set of parallel (identical or unrelated) machines in or...
Eric Angel, Evripidis Bampis, Nicolas Thibault
ACSW
2003
15 years 6 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton