Sciweavers

3299 search results - page 19 / 660
» Privacy and Trusted Computing
Sort
View
NDSS
2005
IEEE
14 years 2 months ago
Privacy-Preserving Friends Troubleshooting Network
— Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topee...
Qiang Huang, Helen J. Wang, Nikita Borisov
CSE
2009
IEEE
14 years 1 months ago
Privacy-Enhanced Event Scheduling
—Event schedulers, well-known from groupware and social software, typically share the problem that they disclose detailed availability patterns of their users. This paper disting...
Benjamin Kellermann, Rainer Böhme
ETRICS
2006
14 years 9 days ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet
CHI
2005
ACM
14 years 9 months ago
A study of preferences for sharing and privacy
We describe studies of preferences about information sharing aimed at identifying fundamental concerns with and at understanding how people might abstract the details of sharing i...
Judith S. Olson, Jonathan Grudin, Eric Horvitz
MSWIM
2005
ACM
14 years 2 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel