Sciweavers

73 search results - page 1 / 15
» Privacy of Trust in Similarity Estimation through Secure Com...
Sort
View
DEXAW
2002
IEEE
84views Database» more  DEXAW 2002»
13 years 10 months ago
Privacy of Trust in Similarity Estimation through Secure Computations
Javier Carbo Rubiera, José M. Molina L&oacu...
WPES
2005
ACM
13 years 10 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
ACSAC
2002
IEEE
13 years 10 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
JCP
2007
121views more  JCP 2007»
13 years 4 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray
IEEEARES
2007
IEEE
13 years 11 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...