Sciweavers

461 search results - page 45 / 93
» Privacy Enhancing Credentials
Sort
View
OOPSLA
1998
Springer
15 years 2 months ago
How to Preserve the Benefits of Design Patterns
The rapid evolution of Design Patterns has hampered the benefits gained from using Design Patterns. The increase in the number of Design Patterns makes a common vocabulary unmanag...
Ellen Agerbo, Aino Cornils
AINA
2006
IEEE
15 years 1 months ago
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired...
Stefaan Seys, Bart Preneel
CHI
2010
ACM
15 years 4 months ago
Friends only: examining a privacy-enhancing behavior in facebook
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...
Fred Stutzman, Jacob Kramer-Duffield
EUROPKI
2007
Springer
15 years 4 months ago
Using WebDAV for Improved Certificate Revocation and Publication
There are several problems associated with the current ways that certificates are published and revoked. This paper discusses these problems, and then proposes a solution based on ...
David W. Chadwick, Sean Anthony
ICDM
2009
IEEE
130views Data Mining» more  ICDM 2009»
14 years 7 months ago
Efficient Anonymizations with Enhanced Utility
The k-anonymization method is a commonly used privacy-preserving technique. Previous studies used various measures of utility that aim at enhancing the correlation between the orig...
Jacob Goldberger, Tamir Tassa