Sciweavers

841 search results - page 112 / 169
» RFIDs and Personal Privacy
Sort
View
CCS
2001
ACM
14 years 1 months ago
Efficient State Updates for Key Management
Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed ...
Benny Pinkas
WWW
2008
ACM
14 years 10 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
14 years 10 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
CHI
2005
ACM
14 years 10 months ago
Location disclosure to social relations: why, when, & what people want to share
Advances in location-enhanced technology are making it easier for us to be located by others. These new technologies present a difficult privacy tradeoff, as disclosing one's...
Sunny Consolvo, Ian E. Smith, Tara Matthews, Antho...
CCS
2007
ACM
14 years 4 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...