Sciweavers

13 search results - page 1 / 3
» Threshold-based identity recovery for privacy enhanced appli...
Sort
View
CCS
2000
ACM
13 years 9 months ago
Threshold-based identity recovery for privacy enhanced applications
ÈÖ Ú Ý Ò ÓÙÒØ Ð ØÝ Ö ÔÓØ ÒØ ÐÐÝ ÓÒ Ø Ò ÓÖ ¹ Ò Þ Ø ÓÒ Ð Ò Ð Ð Ö ÕÙ Ö Ñ ÒØ× Û Ò ÔÔÖÓ Ý ÐÐÓÛ Ò Ù× Ö× ØÓ Ø Ô× Ù ÓÒ...
Joachim Biskup, Ulrich Flegel
ACSW
2007
13 years 6 months ago
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of netw...
Oliver Jorns, Gerald Quirchmayr, Oliver Jung
ESORICS
2009
Springer
14 years 6 months ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
BIOSIG
2008
105views Biometrics» more  BIOSIG 2008»
13 years 6 months ago
A Novel Privacy Enhancing Algorithm for Biometric System
: Biometrics provide the possibility of unique and convenient authentication. As its application areas grow rapidly, the problems, such as identity fraud and cross matching, threat...
Xuebing Zhou, Christoph Busch
PERCOM
2005
ACM
14 years 4 months ago
A Privacy Enhanced Service Architecture for Mobile Users
Location, presence and messaging services provide the essential ingredients for emerging information and communications services. Nevertheless, the users are concerned about revea...
Sandford Bessler, Oliver Jorns