Sciweavers

62 search results - page 10 / 13
» uss 2008
Sort
View
USS
2008
13 years 10 months ago
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties wit
We tackle the problem of building privacy-preserving device-tracking systems -- or private methods to assist in the recovery of lost or stolen Internet-connected mobile devices. T...
Thomas Ristenpart, Gabriel Maganis, Arvind Krishna...
USS
2008
13 years 10 months ago
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST
The State of Ohio commissioned the EVEREST study in late summer of 2007. The study participants were charged with an analysis of the usability, stability, and security of all voti...
Kevin R. B. Butler, William Enck, Harri Hursti, St...
ITIIS
2010
265views more  ITIIS 2010»
13 years 6 months ago
A Recommender System for Device Sharing Based on Context-Aware and Personalization
In ubiquitous computing, invisible devices and software are connected to one another to provide convenient services to users [1][2]. Users hope to obtain a personalized service wh...
Jong-Hyun Park
USS
2008
13 years 10 months ago
An Improved Clock-skew Measurement Technique for Revealing Hidden Services
The Tor anonymisation network allows services, such as web servers, to be operated under a pseudonym. In previous work Murdoch described a novel attack to reveal such hidden servi...
Sebastian Zander, Steven J. Murdoch
USS
2008
13 years 10 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian