Sciweavers

1663 search results - page 20 / 333
» Privacy and Identity Management
Sort
View
CSE
2009
IEEE
14 years 11 months ago
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach
Yasuyuki Tsukada, Ken Mano, Hideki Sakurada, Yoshi...
TMC
2008
159views more  TMC 2008»
15 years 8 days ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
SIGIR
2006
ACM
15 years 7 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
ICC
2007
IEEE
214views Communications» more  ICC 2007»
15 years 8 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
PET
2009
Springer
15 years 8 months ago
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default
Today’s Internet architecture makes no deliberate attempt to provide identity privacy—IP addresses are, for example, often static and the consistent use of a single IP address ...
Barath Raghavan, Tadayoshi Kohno, Alex C. Snoeren,...