Sciweavers

2001 search results - page 79 / 401
» A security architecture for data privacy and security
Sort
View
ASIACRYPT
2005
Springer
15 years 5 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
ESORICS
2012
Springer
13 years 2 months ago
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context ...
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang
CSREASAM
2006
15 years 1 months ago
The Information Security Guideline for SMEs in Korea
To address current difficulties of SMEs that are reluctant to invest in information security due to cost, this paper intends to provide an information security guideline that will...
Gang Shin Lee, Mi Hyun Ahn, Ho-Seong Kim, Jae-il L...
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
16 years 1 hour ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
AICT
2010
IEEE
240views Communications» more  AICT 2010»
14 years 3 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...