Sciweavers

381 search results - page 55 / 77
» Timing attacks on Web privacy
Sort
View
CORR
2012
Springer
227views Education» more  CORR 2012»
12 years 3 months ago
Trajectory and Policy Aware Sender Anonymity in Location Based Services
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these ...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
AINA
2011
IEEE
12 years 11 months ago
Data Caching for Enhancing Anonymity
—The benefits of caching for reducing access time to frequently needed data, in order to improve system performance, are already well-known. In this paper, a proposal for employ...
Rajiv Bagai, Bin Tang
INFSOF
2006
81views more  INFSOF 2006»
13 years 7 months ago
A framework for anonymous but accountable self-organizing communities
In this paper we propose a novel architecture and approach to provide accountability for Web communities that require a high-level of privacy. A two-layered privacy protection arc...
Gábor Ziegler, Csilla Farkas, András...
CSFW
2008
IEEE
14 years 2 months ago
Language Based Secure Communication
Secure communication in distributed systems is notoriously hard to achieve due to the variety of attacks an adversary can mount, based on message interception, modification, redi...
Michele Bugliesi, Riccardo Focardi
CSFW
2004
IEEE
13 years 11 months ago
Using Active Learning in Intrusion Detection
Intrusion Detection Systems (IDSs) have become an important part of operational computer security. They are the last line of defense against malicious hackers and help detect ongo...
Magnus Almgren, Erland Jonsson