Sciweavers

15379 search results - page 35 / 3076
» Protecting users from
Sort
View
CCS
2010
ACM
13 years 6 months ago
PriMa: an effective privacy protection mechanism for social networks
In this paper, we propose PriMa (Privacy Manager), a privacy protection mechanism which supports semi-automated generation of access rules for users’ profile information. PriMa...
Anna Cinzia Squicciarini, Federica Paci, Smitha Su...
FGCS
2000
104views more  FGCS 2000»
13 years 7 months ago
Protecting secret keys with personal entropy
Conventional encryption technology often requires users to protect a secret key by selecting a password or passphrase. While a good passphrase will only be known to the user, it a...
Carl M. Ellison, Chris Hall, Randy Milbert, Bruce ...
DBSEC
2007
80views Database» more  DBSEC 2007»
13 years 9 months ago
A Scalable and Secure Cryptographic Service
In this paper we present the design of a scalable and secure cryptographic service that can be adopted to support large-scale networked systems, which may require strong authentica...
Shouhuai Xu, Ravi S. Sandhu
SP
2009
IEEE
14 years 2 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel
WICON
2008
13 years 9 months ago
Lightweight management of scalable and personalised media in mobile IPTV networks
In the present paper a novel system for scalable and personalised media management and its architecture is presented. The proposed solution is based on the creation of a secure an...
Laura Arnaiz, Lara García, Federico Alvarez...