Sciweavers

3299 search results - page 20 / 660
» Privacy and Trusted Computing
Sort
View
ESORICS
2009
Springer
14 years 3 months ago
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services
Abstract. The ubiquity of smartphones and other location-aware handheld devices has resulted in a dramatic increase in popularity of locationbased services (LBS) tailored to user l...
Ali Khoshgozaran, Cyrus Shahabi
WISTP
2009
Springer
14 years 3 months ago
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
Olivier Heen, Gilles Guette, Thomas Genet
ACSAC
1998
IEEE
14 years 27 days ago
The Solar Trust Model: Authentication Without Limitation
Michael Clifford, C. Lavine, Matt Bishop
DRMTICS
2005
Springer
13 years 10 months ago
TIVA: Trusted Integrity Verification Architecture
Mahadevan Gomathisankaran, Akhilesh Tyagi
HUC
2007
Springer
14 years 2 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell