Sciweavers

408 search results - page 64 / 82
» Tailoring Privacy to Users' Needs
Sort
View
CCS
2006
ACM
13 years 11 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
JNCA
2011
123views more  JNCA 2011»
13 years 2 months ago
Empirical tests of anonymous voice over IP
Voice over IP (VoIP) is an important service on the Internet, and privacy for VoIP calls will be increasingly important for many people. Providing this privacy, however, is challen...
Marc Liberatore, Bikas Gurung, Brian Neil Levine, ...
ICMCS
2006
IEEE
146views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Hybrid Traitor Tracing
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing ...
Hongxia Jin, Jeffery Lotspiech
ICHIT
2009
Springer
14 years 2 months ago
Using w3af to achieve automated penetration testing by live DVD/live USB
As the popularity of the Internet continues growing, there are more and more services appeared, security measures are expected to become all the most important on the Internet. Pe...
Jiun-Kai Ke, Chung-Huang Yang, Tae-Nam Ahn
ICAC
2007
IEEE
14 years 2 months ago
An Autonomic Service Discovery Mechanism to Support Pervasive Device Accessing Semantic Grid
An important challenge of integrating pervasive devices into Grid environment to enhance pervasive device capabilities is that pervasive devices need to locate, find, select and ...
Tao Guan, Ed Zaluska, David De Roure