Sciweavers

1663 search results - page 81 / 333
» Privacy and Identity Management
Sort
View
P2P
2010
IEEE
136views Communications» more  P2P 2010»
15 years 2 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
GI
2003
Springer
15 years 9 months ago
Active Data Protection with Data Journals
: A major privacy problem on the internet is the unrestricted sharing of user data between services and other parties. The EU privacy legislation grants the user the rights to rest...
Lars Brückner, Jan Steffan, Wesley Terpstra, ...
INFOCOM
2011
IEEE
14 years 8 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
EUROCRYPT
2006
Springer
15 years 8 months ago
Our Data, Ourselves: Privacy Via Distributed Noise Generation
In this work we provide efficient distributed protocols for generating shares of random noise, secure against malicious participants. The purpose of the noise generation is to crea...
Cynthia Dwork, Krishnaram Kenthapadi, Frank McSher...
ACISP
2007
Springer
15 years 8 months ago
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biom...
Julien Bringer, Hervé Chabanne, Malika Izab...