Sciweavers

1790 search results - page 73 / 358
» On Privacy Models for RFID
Sort
View
JTAER
2010
139views more  JTAER 2010»
15 years 3 days ago
Sharing Reputation Across Virtual Communities
This paper outlines the privacy concerns in the CrossCommunity Reputation (CCR) model for sharing reputation knowledge across communities. These privacy concerns are discussed and...
Nurit Gal-Oz, Tal Grinshpoun, Ehud Gudes
CCS
2006
ACM
15 years 9 months ago
Improving secure server performance by re-balancing SSL/TLS handshakes
Much of today's distributed computing takes place in a client/server model. Despite advances in fault tolerance
Claude Castelluccia, Einar Mykletun, Gene Tsudik
156
Voted
CSFW
2007
IEEE
15 years 11 months ago
Privacy and Utility in Business Processes
se an abstract model of business processes for the purpose of (i) evaluating privacy policy in light of the goals of the process and (ii) developing automated support for privacy ...
Adam Barth, John C. Mitchell, Anupam Datta, Sharad...
SECON
2007
IEEE
15 years 11 months ago
Query privacy in wireless sensor networks
— Existing mechanisms for querying wireless sensor networks leak client interests to the servers performing the queries. The leaks are not only in terms of specific regions but ...
Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pea...
ESAS
2007
Springer
15 years 9 months ago
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs
The promise of vehicular communications is to make road traffic safer and more efficient. However, besides the expected benefits, vehicular communications also introduce some priva...
Levente Buttyán, Tamás Holczer, Istv...