Sciweavers

461 search results - page 34 / 93
» Privacy Enhancing Credentials
Sort
View
ACSAC
2001
IEEE
15 years 1 months ago
A Regulated Approach to Certificate Management
Traditionally, creation and revocation of certificates are performed manually, by trusted agents, under conditions that are rarely formalized. This approach to certificate managem...
Victoria Ungureanu
IADIS
2004
14 years 11 months ago
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth
The Shibboleth middleware from Internet2 provides a way for users at higher-education institutions to access remote electronic content in compliance with the inter-institutional l...
Sidharth Nazareth, Sean W. Smith
CCS
2011
ACM
13 years 10 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...
IJWMC
2006
112views more  IJWMC 2006»
14 years 10 months ago
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
: Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven th...
Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan...
ECIR
2011
Springer
14 years 1 months ago
Enhancing Deniability against Query-Logs
We propose a method for search privacy on the Internet, focusing on enhancing plausible deniability against search engine query-logs. The method approximates the target search resu...
Avi Arampatzis, Pavlos Efraimidis, George Drosatos