Sciweavers

841 search results - page 49 / 169
» RFIDs and Personal Privacy
Sort
View
CAISE
2003
Springer
14 years 2 months ago
Towards a Component based Privacy Protector Architecture
The development of mobile communication technology and ubiquitous computing paradigm and the emergence of m-healthcare, m-business and m-education services have raised the urgency ...
Amr Ali Eldin, René W. Wagenaar
ACSAC
2000
IEEE
14 years 1 months ago
Personal Security Environment on Palm PDA
Digital signature schemes are based on the assumption that the signing key is kept in secret. Ensuring that this assumption holds is one of the most crucial problems for all curre...
Margus Freudenthal, S. Heiberg, Jan Willemson
ACSAC
2000
IEEE
14 years 1 months ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
SIN
2010
ACM
13 years 6 months ago
Analysis of privacy in online social networks of runet
In recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situation...
Slava Kisilevich, Florian Mansmann
EUROPKI
2004
Springer
14 years 2 months ago
Using LDAP Directories for Management of PKI Processes
We present a framework for extending the functionality of LDAP servers from their typical use as a public directory in public key infrastructures. In this framework the LDAP server...
Vangelis Karatsiolis, Marcus Lippert, Alexander Wi...