Sciweavers

2363 search results - page 92 / 473
» How Secure is RFID
Sort
View
SPW
2005
Springer
15 years 10 months ago
Enhancing Privacy with Shared Pseudo Random Sequences
Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have...
Jari Arkko, Pekka Nikander, Mats Näslund
130
Voted
ACSAC
1998
IEEE
15 years 8 months ago
A Practical Approach to Measuring Assurance
1 Assurance has been defined as "the degree of confidence that security needs are satisfied"[2]. The problem with this definition is that, unless one has a way to specify...
G. F. Jelen, J. R. Williams
PET
2012
Springer
13 years 7 months ago
Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients
The continuing advancements in microprocessor technologies are putting more and more computing power into small devices. Today smartphones are especially popular. Nevertheless, for...
Martin Pirker, Daniel Slamanig, Johannes Winter
145
Voted
PET
2012
Springer
13 years 7 months ago
Exploring the Ecosystem of Referrer-Anonymizing Services
The constant expansion of the World Wide Web allows users to enjoy a wide range of products and services delivered directly to their browsers. At the same time however, this expans...
Nick Nikiforakis, Steven Van Acker, Frank Piessens...
IEEEARES
2009
IEEE
15 years 11 months ago
Identifying and Resolving Least Privilege Violations in Software Architectures
The implementation of security principles, like least privilege, in a software architecture is difficult, as no systematic rules on how to apply them in practice exist. As a resu...
Koen Buyens, Bart De Win, Wouter Joosen