Sciweavers

1663 search results - page 58 / 333
» Privacy and Identity Management
Sort
View
104
Voted
COMPSEC
2008
69views more  COMPSEC 2008»
15 years 3 months ago
Secure log management for privacy assurance in electronic communications
Vassilios Stathopoulos, Panayiotis Kotzanikolaou, ...
JASIS
2011
145views more  JASIS 2011»
14 years 11 months ago
CoPE: Enabling collaborative privacy management in online social networks
Anna Cinzia Squicciarini, Heng Xu, Xiaolong (Luke)...
CSE
2009
IEEE
15 years 11 months ago
Modelling of Pseudonymity under Probabilistic Linkability Attacks
—This paper contributes to the field of measuring (un)linkability in communication systems; a subproblem of privacy protection. We propose an attacker state model for attacks on...
Martin Neubauer
DIM
2009
ACM
15 years 10 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
CSI
2008
68views more  CSI 2008»
15 years 4 months ago
Privacy and forensics investigation process: The ERPINA protocol
The rights of an Internet user acting anonymously conflicts with the rights of a Server victim identifying the malicious user. The ERPINA protocol, introduced in this paper, allow...
Giannakis Antoniou, Leon Sterling, Stefanos Gritza...