Sciweavers

WPES
2005
ACM
13 years 10 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
WPES
2005
ACM
13 years 10 months ago
Secure off-the-record messaging
At the 2004 Workshop on Privacy in the Electronic Society (WPES), Borisov, Goldberg and Brewer, presented “Off the Record Messaging” (OTR), a protocol designed to add endto-e...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
WPES
2005
ACM
13 years 10 months ago
Quantitative evaluation of unlinkable ID matching schemes
Yasunobu Nohara, Sozo Inoue, Kensuke Baba, Hiroto ...
WPES
2005
ACM
13 years 10 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
WPES
2005
ACM
13 years 10 months ago
Peripheral privacy notifications for wireless networks
This study aims to develop techniques for allowing users to form more accurate expectations of privacy. We have developed a peripheral display for notifying users when their compu...
Braden Kowitz, Lorrie Faith Cranor
WPES
2005
ACM
13 years 10 months ago
Coercion-resistant electronic elections
Ari Juels, Dario Catalano, Markus Jakobsson
WPES
2005
ACM
13 years 10 months ago
The privacy cost of the second-chance offer
This paper examines a generalization of a two-stage game common on eBay: an ascending-price auction followed by price discrimination (the second chance offer). High bids in the a...
Sumit Joshi, Yu-An Sun, Poorvi L. Vora
WPES
2005
ACM
13 years 10 months ago
Determining user privacy preferences by asking the right questions: an automated approach
As the Internet becomes increasingly used for sensitive transactions, the need to protect user privacy becomes more and more important. One fundamental aspect of user privacy is t...
Keith Irwin, Ting Yu
WPES
2005
ACM
13 years 10 months ago
Information revelation and privacy in online social networks
Participation in social networking sites has dramatically increased in recent years. Services such as Friendster, Tribe, or the Facebook allow millions of individuals to create on...
Ralph Gross, Alessandro Acquisti, H. John Heinz II...
WPES
2005
ACM
13 years 10 months ago
Mining rule semantics to understand legislative compliance
Organizations in privacy-regulated industries (e.g. healthcare and financial institutions) face significant challenges when developing policies and systems that are properly align...
Travis D. Breaux, Annie I. Antón