Sciweavers

1790 search results - page 65 / 358
» On Privacy Models for RFID
Sort
View
ISI
2005
Springer
15 years 5 months ago
Testing a Rational Choice Model of Airline Hijackings
Laura Dugan, Gary LaFree, Alex R. Piquero
ISI
2003
Springer
15 years 5 months ago
Locating Hidden Groups in Communication Networks Using Hidden Markov Models
Malik Magdon-Ismail, Mark K. Goldberg, William A. ...
ACISP
2006
Springer
15 years 5 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
CCS
2007
ACM
15 years 6 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
ESORICS
2007
Springer
15 years 6 months ago
On the Privacy of Concealed Data Aggregation
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
Aldar C.-F. Chan, Claude Castelluccia