Sciweavers

408 search results - page 20 / 82
» Tailoring Privacy to Users' Needs
Sort
View
WWW
2009
ACM
14 years 8 months ago
Privacy diffusion on the web: a longitudinal perspective
For the last few years we have studied the diffusion of private information about users as they visit various Web sites triggering data gathering aggregation by third parties. Thi...
Balachander Krishnamurthy, Craig E. Wills
HUC
2007
Springer
14 years 2 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
DEXAW
2003
IEEE
131views Database» more  DEXAW 2003»
14 years 1 months ago
Privacy and Trusted Computing
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user ...
Juan Manuel González Nieto, Ed Dawson, Eiji...
GIS
2009
ACM
14 years 9 months ago
PROS: A Peer-to-Peer System for Location Privacy Protection on Road Networks
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
Jie Bao 0003, Haiquan Chen, Wei-Shinn Ku
MHCI
2009
Springer
14 years 2 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi