Sciweavers

1663 search results - page 61 / 333
» Privacy and Identity Management
Sort
View
150
Voted
ICPADS
2005
IEEE
15 years 9 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
COCOON
2010
Springer
15 years 9 months ago
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key crypt...
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferr...
DBSEC
2007
151views Database» more  DBSEC 2007»
15 years 5 months ago
Location Privacy Protection Through Obfuscation-Based Techniques
The widespread adoption of mobile communication devices combined with technical improvements of location technologies are fostering the development of a new wave of applications th...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
CHI
2007
ACM
16 years 4 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
ICDM
2009
IEEE
167views Data Mining» more  ICDM 2009»
15 years 10 months ago
A Framework for Computing the Privacy Scores of Users in Online Social Networks
—A large body of work has been devoted to address corporate-scale privacy concerns related to social networks. The main focus was on how to share social networks owned by organiz...
Kun Liu, Evimaria Terzi