Sciweavers

461 search results - page 57 / 93
» Privacy Enhancing Credentials
Sort
View
DIM
2005
ACM
15 years 1 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
CCS
2010
ACM
15 years 2 days ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
BIOSIG
2010
152views Biometrics» more  BIOSIG 2010»
14 years 10 months ago
Biometric Systems in Future Preventive Scenarios - Legal Issues and Challenges
: The privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may d...
Gerrit Hornung, Monika Desoi, Matthias Pocs
CCS
2009
ACM
16 years 14 days ago
Formalizing information security knowledge
Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper de...
Stefan Fenz, Andreas Ekelhart
CSFW
2009
IEEE
15 years 6 months ago
Achieving Security Despite Compromise Using Zero-knowledge
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This pa...
Michael Backes, Martin P. Grochulla, Catalin Hritc...