Sciweavers

119 search results - page 24 / 24
» Self Protecting Data for De-perimeterised Information Sharin...
Sort
View
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
13 years 8 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
ESWS
2010
Springer
13 years 9 months ago
Guarding a Walled Garden - Semantic Privacy Preferences for the Social Web
Abstract. With increasing usage of Social Networks, giving users the possibility to establish access restrictions on their data and resources becomes more and more important. Howev...
Philipp Kärger, Wolf Siberski
CCS
2011
ACM
12 years 4 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
BMCBI
2004
128views more  BMCBI 2004»
13 years 4 months ago
cuticleDB: a relational database of Arthropod cuticular proteins
Background: The insect exoskeleton or cuticle is a bi-partite composite of proteins and chitin that provides protective, skeletal and structural functions. Little information is a...
Christiana K. Magkrioti, Ioannis C. Spyropoulos, V...