Sciweavers

1663 search results - page 59 / 333
» Privacy and Identity Management
Sort
View
DEXAW
2002
IEEE
112views Database» more  DEXAW 2002»
15 years 9 months ago
Privacy-Enabled Services for Enterprises
The IBM Enterprise Privacy Architecture (EPA) is a methodology for enterprises to provide an enhanced and well-defined level of privacy to their customers. EPA is structured in f...
Günter Karjoth, Matthias Schunter, Michael Wa...
AINA
2009
IEEE
15 years 9 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
SCN
2008
Springer
15 years 4 months ago
An Identity-Based Key Agreement Protocol for the Network Layer
A new identity-based key agreement protocol designed to operate on thenetworklayerispresented. Endpoint addresses, namelyIP and MAC addresses, areusedaspublickeystoauthenticatethe ...
Christian Schridde, Matthew Smith, Bernd Freislebe...
UM
2007
Springer
15 years 10 months ago
To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications
User’s privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model wh...
Giuseppe Lugano, Pertti Saariluoma
FOSAD
2007
Springer
15 years 10 months ago
An Introduction to the Role Based Trust Management Framework RT
Marcin Czenko, Sandro Etalle, Dongyi Li, William H...