Sciweavers

1663 search results - page 46 / 333
» Privacy and Identity Management
Sort
View
ICDCSW
2005
IEEE
15 years 9 months ago
Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy
Due to the utilization of location information, geographic ad hoc routing presents superiority in scalability compared with traditional topology-based routing in mobile ad hoc net...
Zhou Zhi, Yow Kin Choong
INFOCOM
1995
IEEE
15 years 7 months ago
The Use of Communications Networks to Increase Personal Privacy
CommunicationsNetworks can separate as well asjoin iMormation. This ability can be used to increase personal privacy in an environment where advances in technology makes it possib...
Nicholas F. Maxemchuk, Steven H. Low
CANS
2007
Springer
96views Cryptology» more  CANS 2007»
15 years 10 months ago
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication
Abstract. We present a semantic extension to X.509 certificates that allows incorporating new anonymity signature schemes into the X.509 framework. This fact entails advantages to...
Vicente Benjumea, Seung Geol Choi, Javier Lopez, M...
JAMIA
2011
68views more  JAMIA 2011»
14 years 7 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
103
Voted
OOPSLA
2007
Springer
15 years 10 months ago
Complexity management
Klaus Marquardt, Jens Coldewey, Lise B. Hvatum