Sciweavers

408 search results - page 46 / 82
» Tailoring Privacy to Users' Needs
Sort
View
CCS
2004
ACM
13 years 11 months ago
Group signatures with verifier-local revocation
Group signatures have recently become important for enabling privacy-preserving attestation in projects such as Microsoft's ngscb effort (formerly Palladium). Revocation is c...
Dan Boneh, Hovav Shacham
CCS
2008
ACM
13 years 10 months ago
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
IEEEARES
2010
IEEE
13 years 6 months ago
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients
Online auctions of governmental bonds and CO2 certificates are challenged by high availability requirements in face of high peak loads around the auction deadline. Traditionally, t...
Guenther Starnberger, Lorenz Froihofer, Karl M. G&...
SOUPS
2005
ACM
14 years 1 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
EUROMICRO
2006
IEEE
14 years 2 months ago
From PRIMI to PRIMIFaces: Technical Concepts for Selective Information Disclosure
Instant messaging platforms facilitate coordination in workgroups by providing users with mutual information on their presence and availability, allowing for ad-hoc conversations ...
Tom Gross, Christoph Oemig