Sciweavers

15379 search results - page 24 / 3076
» Protecting users from
Sort
View
JCSS
2006
102views more  JCSS 2006»
13 years 7 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
MDM
2007
Springer
106views Communications» more  MDM 2007»
14 years 1 months ago
Protecting Moving Trajectories with Dummies
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee
IPPS
2006
IEEE
14 years 1 months ago
Coordinate transformation - a solution for the privacy problem of location based services?
Protecting location information of mobile users in Location Based Services (LBS) is a very important but quite difficult and still largely unsolved problem. Location information h...
Andreas Gutscher
ARESEC
2011
110views more  ARESEC 2011»
12 years 7 months ago
ACON: Activity-Centric Access Control for Social Computing
—With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the avera...
Jaehong Park, Ravi S. Sandhu, Yuan Cheng
CSREASAM
2006
13 years 9 months ago
Custom Plugin - A Solution to Phishing and Pharming Attacks
- This paper proposes a new method to detect, alert and protect the user from Internationalized Domain Names [1] (IDN) and Uniform Resource Locator (URL) spoofing, phishing, pharmi...
Omer Mahmood