Sciweavers

1663 search results - page 307 / 333
» Privacy and Identity Management
Sort
View
ISECS
2008
IEEE
15 years 6 months ago
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer befo...
Mina Deng, Bart Preneel
NOMS
2008
IEEE
107views Communications» more  NOMS 2008»
15 years 6 months ago
A Framework for the establishment of inter-domain, on-demand VPNs
– Virtual Private Networks (VPNs) are a popular and cost-effective means to build wide-area corporate networks, since they provide bandwidth, privacy and security for a fraction ...
Alexandre Matos, Fernando Matos, Paulo Simõ...
ADAPTIVE
2007
Springer
15 years 6 months ago
User Profiles for Personalized Information Access
Abstract. The amount of information available online is increasing exponentially. While this information is a valuable resource, its sheer volume limits its value. Many research pr...
Susan Gauch, Mirco Speretta, Aravind Chandramouli,...
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 6 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
MIDDLEWARE
2007
Springer
15 years 6 months ago
Middleware support for protecting personal data from web based data services
Web based data services are very popular with the average computer user. Examples of such services include Gmail.com, Yahoo Photos, Yahoo Briefcase and Amazon S3 Service. In such ...
Ravi Chandra Jammalamadaka