Sciweavers

2272 search results - page 287 / 455
» Provable Data Privacy
Sort
View
137
Voted
USENIX
2007
15 years 4 months ago
POTSHARDS: Secure Long-Term Storage Without Encryption
Users are storing ever-increasing amounts of information digitally, driven by many factors including government regulations and the public’s desire to digitally record their per...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller,...
CHI
2007
ACM
16 years 3 months ago
Sharing motion information with close family and friends
We present the Motion Presence application, an augmented phone book style application that allows close friends and family to view each other's current motion status ("m...
Frank Bentley, Crysta J. Metcalf
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
15 years 9 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
115
Voted
CCS
2005
ACM
15 years 8 months ago
Keyboard acoustic emanations revisited
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and t...
Li Zhuang, Feng Zhou, J. D. Tygar
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
15 years 6 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson