Sciweavers

1663 search results - page 48 / 333
» Privacy and Identity Management
Sort
View
ICWSM
2008
15 years 5 months ago
Examining Privacy in Blogging from the Reader's Perspective
While previous work has studied bloggers' practices with respect to negotiating privacy, little research has been done on blog readers' perceptions of privacy. This post...
Eric Baumer, Mark Sueyoshi, Bill Tomlinson
ICMCS
2010
IEEE
160views Multimedia» more  ICMCS 2010»
15 years 5 months ago
A framework for the validation of privacy protection solutions in video surveillance
The issue of privacy protection in video surveillance has drawn a lot of interest lately. However, thorough performance analysis and validation is still lacking, especially regard...
Frédéric Dufaux, Touradj Ebrahimi
JCM
2007
101views more  JCM 2007»
15 years 3 months ago
Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond
Abstract— New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as library books, pay...
Marci Meingast, Jennifer King, Deirdre K. Mulligan
153
Voted
EUROCRYPT
2004
Springer
15 years 9 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
COMSNETS
2012
222views more  COMSNETS 2012»
13 years 11 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...