Sciweavers

1402 search results - page 128 / 281
» Personalized privacy preservation
Sort
View
99
Voted
NDSS
2006
IEEE
15 years 6 months ago
Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorit
Volunteer distributed computations utilize spare processor cycles of personal computers that are connected to the Internet. The resulting platforms provide computational power pre...
Doug Szajda, Michael Pohl, Jason Owen, Barry G. La...
87
Voted
HICSS
2002
IEEE
99views Biometrics» more  HICSS 2002»
15 years 5 months ago
Privacy in Distributed Electronic Commerce
In recent years there has been a movement toward deployment of distributed approaches for electronic commerce. Intelligent software agents, for instance, may be instructed to act ...
Larry Korba
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
15 years 5 months ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu
109
Voted
UCS
2007
Springer
15 years 7 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
103
Voted
PET
2005
Springer
15 years 6 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey