Sciweavers

15379 search results - page 321 / 3076
» Protecting users from
Sort
View
ACSAC
2009
IEEE
15 years 10 months ago
A New Approach for Anonymous Password Authentication
—Anonymous password authentication reinforces password authentication with the protection of user privacy. Considering the increasing concern of individual privacy nowadays, anon...
Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao
112
Voted
CSE
2009
IEEE
15 years 10 months ago
Enabling Privacy as a Fundamental Construct for Social Networks
The current set of social networking platforms, e.g. Facebook and MySpace, has created a new class of Internet applications called social software. These systems focus on leveragi...
E. Michael Maximilien, Tyrone Grandison, Kun Liu, ...
132
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Optimal Sensing-Transmission Structure for Dynamic Spectrum Access
—In cognitive wireless networks where secondary users (SUs) opportunistically access spectral white spaces of primary users (PUs), there exists an inherent tradeoff between sensi...
Senhua Huang, Xin Liu, Zhi Ding
130
Voted
ICMCS
2006
IEEE
146views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Hybrid Traitor Tracing
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing ...
Hongxia Jin, Jeffery Lotspiech
152
Voted
FC
1999
Springer
184views Cryptology» more  FC 1999»
15 years 8 months ago
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
Abstract. Anonymity features of electronic payment systems are important for protecting privacy in an electronic world. However, complete anonymity prevents monitoring financial t...
Tomas Sander, Amnon Ta-Shma