Sciweavers

382 search results - page 39 / 77
» k-Anonymity: A Model for Protecting Privacy
Sort
View
HIPEAC
2005
Springer
14 years 1 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
CHI
2002
ACM
14 years 8 months ago
The context fabric: an infrastructure for context-aware computing
Despite many sensor, hardware, networking, and software advances, it is still quite difficult to build effective and reliable context-aware applications. We propose to build a con...
Jason I. Hong
CSFW
1998
IEEE
14 years 1 hour ago
Formal Analysis of a Non-Repudiation Protocol
This paper applies the theory of Communicating Sequential Processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols di er from authent...
Steve Schneider
CCS
2008
ACM
13 years 9 months ago
Cognitive security for personal devices
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Rachel Greenstadt, Jacob Beal
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
14 years 2 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003