Sciweavers

2399 search results - page 168 / 480
» On Authentication between Human and Computer
Sort
View
TMC
2010
109views more  TMC 2010»
15 years 2 months ago
Uncertainty Modeling and Reduction in MANETs
—Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong...
Feng Li, Jie Wu
ACSAC
2009
IEEE
15 years 11 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
CRYPTO
2009
Springer
105views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Privacy-Enhancing Auctions Using Rational Cryptography
Abstract. We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, ou...
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Tr...
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
15 years 8 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
JCP
2006
86views more  JCP 2006»
15 years 4 months ago
MapWiki: A Map-based Content Sharing System for Distributed Location-dependent Information
Abstract-- In this paper, we propose a new map-based content sharing system 'MapWiki' for ubiquitous content distribution. In MapWiki, users can publish location-dependen...
Yuuichi Teranishi, Junzo Kamahara, Shinji Shimojo