Sciweavers

841 search results - page 138 / 169
» RFIDs and Personal Privacy
Sort
View
CSE
2009
IEEE
13 years 7 months ago
Edge Anonymity in Social Network Graphs
Edges in social network graphs can model sensitive relationships. In this paper, we consider the problem of edges anonymity in graphs. We propose a probabilistic notion of edge ano...
Lijie Zhang, Weining Zhang
FI
2010
175views more  FI 2010»
13 years 7 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao
CSCW
2011
ACM
13 years 5 months ago
Faceted identity, faceted lives: social and technical issues with being yourself online
This paper explores key issues people experience managing personal boundaries within and across social technologies. We look in particular at email and online social networks. We ...
Shelly Farnham, Elizabeth F. Churchill
TITB
2010
181views Education» more  TITB 2010»
13 years 4 months ago
PSKA: usable and secure key agreement scheme for body area networks
A Body Area Network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized health-care. Securing inter-sensor communications within BANs is essen...
Krishna K. Venkatasubramanian, Ayan Banerjee, Sand...
CCS
2009
ACM
14 years 10 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin