Sciweavers

364 search results - page 12 / 73
» Privacy Requirements Implemented with a JavaCard
Sort
View
IH
1998
Springer
15 years 1 months ago
Biometric yet Privacy Protecting Person Authentication
Many eligibility or entitlement certificates in every day life are non-transferable between persons. However, they are usually implemented by personal physical tokens that owners c...
Gerrit Bleumer
ATAL
2007
Springer
14 years 11 months ago
InterPol: a policy framework for managing trust and privacy in referral networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...
Yathiraj B. Udupi, Munindar P. Singh
101
Voted
SP
2002
IEEE
141views Security Privacy» more  SP 2002»
14 years 9 months ago
Collaborative Filtering with Privacy
Server-based collaborative filtering systems have been very successful in e-commerce and in direct recommendation applications. In future, they have many potential applications in...
John F. Canny
VSGAMES
2010
114views Game Theory» more  VSGAMES 2010»
14 years 7 months ago
Privacy Challenges and Methods for Virtual Classrooms in Second Life Grid and OpenSimulator
—Mass adoption of virtual world platforms for education and training implies efficient management of computational resources. In Second Life Grid and OpenSimulator, commonly used...
Andreas Vilela, Marcio Cardoso, Daniel Martins, Ar...
NDSS
2009
IEEE
15 years 4 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...