Sciweavers

115 search results - page 21 / 23
» Privacy and identity management for everyone
Sort
View
CHI
2005
ACM
16 years 4 days ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
ICEIS
2008
IEEE
15 years 6 months ago
Hippocratic Multi-Agent Systems
The current evolution of Information Technology leads to the increase of automatic data processing over multiple information systems. The data we deal with concerns sensitive infor...
Ludivine Crépin, Laurent Vercouter, Olivier...
ESAW
2008
Springer
15 years 1 months ago
Sensitive Data Transaction in Hippocratic Multi-Agent Systems
The current evolution of Information Technology leads to the increase of automatic data processing over multiple information systems. The data we deal with concerns sensitive infor...
Ludivine Crépin, Yves Demazeau, Olivier Boi...
91
Voted
ENTCS
2008
130views more  ENTCS 2008»
14 years 11 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
CCS
2003
ACM
15 years 5 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves