Sciweavers

IFIP11
2004
110views Business» more  IFIP11 2004»
14 years 28 days ago
A Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [1] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. Th...
Andreas Pashalidis, Chris J. Mitchell
IFIP11
2004
102views Business» more  IFIP11 2004»
14 years 28 days ago
Privacy Invasive Software in File-Sharing Tools
Andreas Jacobsson, Martin Boldt, Bengt Carlsson
IFIP11
2004
109views Business» more  IFIP11 2004»
14 years 28 days ago
Taxonomy of Mixes and Dummy Traffic
This paper presents an analysis of mixes and dummy traffic policies, which are building blocks of anonymous services. The goal of the paper is to bring together all the issues rela...
Claudia Díaz, Bart Preneel
IFIP11
2004
114views Business» more  IFIP11 2004»
14 years 28 days ago
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications
: Software fixes, patches and updates are issued periodically to extend the functional life cycle of software products. In order to facilitate the prompt notification, delivery, an...
Andrew M. Colarik, Clark D. Thomborson, Lech J. Ja...
IFIP11
2004
122views Business» more  IFIP11 2004»
14 years 28 days ago
Infusing Privacy Norms in DRM - Incentives and Perspectives from Law
: This paper outlines some basic characteristics of digital rights management (DRM) systems, as well as the ways that DRM systems can threaten user privacy. The author asserts that...
Alex Cameron
IFIP11
2004
141views Business» more  IFIP11 2004»
14 years 28 days ago
Identity Management for Self-Portrayal
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Tobias Baier, Christian P. Kunze