Sciweavers

15379 search results - page 21 / 3076
» Protecting users from
Sort
View
USENIX
2003
13 years 9 months ago
The CryptoGraphic Disk Driver
We present the design and implementation of CGD, the CryptoGraphic Disk driver. CGD is a pseudo-device driver that sits below the buffer cache, and provides an encrypted view of a...
Roland C. Dowdeswell, John Ioannidis
ICDCS
2010
IEEE
13 years 11 months ago
Fingerprinting Mobile User Positions in Sensor Networks
- We demonstrate that the network flux over the sensor network provides us fingerprint information about the mobile users within the field. Such information is exoteric in the phys...
Mo Li, Xiaoye Jiang, Leonidas J. Guibas
FC
2007
Springer
111views Cryptology» more  FC 2007»
14 years 1 months ago
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for some goods or services. Nguyen (FC 2006), deepening the ideas of Chen et...
Liqun Chen, Alberto N. Escalante, Hans Löhr, ...
ICC
2009
IEEE
135views Communications» more  ICC 2009»
13 years 5 months ago
Optimal Power Allocation for Cognitive Radio Under Primary User's Outage Loss Constraint
In this paper, we consider a secondary link sharing the spectrum with a primary link in a fading cognitive radio (CR) network. Instead of applying the conventional interference pow...
Xin Kang, Rui Zhang, Ying-Chang Liang, Hari Krishn...
IDTRUST
2010
ACM
14 years 26 days ago
CardSpace-liberty integration for CardSpace users
Whilst the growing number of identity management systems have the potential to reduce the threat of identity attacks, major deployment problems remain because of the lack of inter...
Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J....