Sciweavers

15379 search results - page 229 / 3076
» Protecting users from
Sort
View
HICSS
2007
IEEE
96views Biometrics» more  HICSS 2007»
14 years 2 months ago
Information Privacy and Trust in Government: a citizen-based perspective from New Zealand
Increasing use of e-government has raised issues about the privacy of information provided by citizens to government. This paper explores the experiences and concerns of New Zeala...
Rowena Cullen, Patrick Reilly
MIDDLEWARE
2007
Springer
14 years 2 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
ICEBE
2006
IEEE
115views Business» more  ICEBE 2006»
14 years 2 months ago
From Commodity to Value: A Privacy-Preserving e-Business Architecture
Privacy has been recognized as a very important issue in electronic commerce. However, many privacy techniques were not adopted and many online anonymity services failed. In this ...
Yitao Duan, John F. Canny
SACMAT
2004
ACM
14 years 1 months ago
On the role of roles: from role-based to role-sensitive access control
This paper maintains that for an access-control mechanism to support a wide range of policies, it is best to dispense with any built-in semantics for roles in the mechanism itself...
Xuhui Ao, Naftaly H. Minsky
IJNSEC
2007
138views more  IJNSEC 2007»
13 years 8 months ago
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simpli ed group signature without any manager. It protects the anonymity of a signer....
Amit K. Awasthi, Sunder Lal