Sciweavers

2001 search results - page 29 / 401
» A security architecture for data privacy and security
Sort
View
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 6 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
SEC
2003
15 years 1 months ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera
ACSAC
2003
IEEE
15 years 5 months ago
PSOS Revisited
This paper provides a retrospective view of the design of SRI’s Provably Secure Operating System (PSOS), a formally specified tagged-capability hierarchical system architecture...
Peter G. Neumann, Richard J. Feiertag
SAFECOMP
1998
Springer
15 years 4 months ago
Fault-Tolerant Communication in Large-Scale Manipulators
Abstract. In this paper concepts for fault-tolerant communication systems in large-scale manipulators for heavy weights are introduced. This class of robots makes high demands on s...
Hans-Dieter Kochs, Walter Geisselhardt, Holger Hil...
MDM
2007
Springer
154views Communications» more  MDM 2007»
15 years 6 months ago
Analysis of Security and Privacy Issues in RFID-Based Reference Point Systems
In this paper, we analyze security and privacy issues in RFID-based reference point systems, which seamlessly provide high resolution location information so as to enable innovati...
Oranat Sangratanachaikul, Leping Huang, Shin'ichi ...