Sciweavers

712 search results - page 76 / 143
» A Study on the Security of Privacy Homomorphism
Sort
View
CHI
2008
ACM
15 years 10 months ago
Access control by testing for shared knowledge
Controlling the privacy of online content is difficult and often confusing. We present a social access control where users devise simple questions of shared knowledge instead of c...
Michael Toomim, Xianhang Zhang, James Fogarty, Jam...
ACMDIS
2010
ACM
14 years 10 months ago
On the design of a "moody" keyboard
To counter the increasing number of online threats for users' privacy and security, this paper explores the design of an ambient security indicator, in form of a standard key...
Alexander De Luca, Bernhard Frauendienst, Max-Eman...
ESORICS
2008
Springer
14 years 11 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
ACSAC
2002
IEEE
15 years 2 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
CCS
2007
ACM
15 years 4 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...