Sciweavers

464 search results - page 21 / 93
» Privacy Engineering for Digital Rights Management Systems
Sort
View
DIM
2005
ACM
14 years 12 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
ISMIR
2005
Springer
172views Music» more  ISMIR 2005»
15 years 3 months ago
Preservation Digitization of David Edelberg's Handel LP Collection: A Pilot Project
Although analogue phonograph recordings (LPs) have long shelf lives, there are many reasons for initiating research into proper procedures for their digital preservation. In order...
Catherine Lai, Beinan Li, Ichiro Fujinaga
MOBISYS
2007
ACM
15 years 9 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
CCS
2006
ACM
15 years 1 months ago
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly scalable offline and decentralized applications that would otherwise be prone to replay a...
Luis F. G. Sarmenta, Marten van Dijk, Charles W. O...
DIM
2006
ACM
15 years 4 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...