Sciweavers

2454 search results - page 228 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ESAW
2008
Springer
15 years 3 months ago
Sensitive Data Transaction in Hippocratic Multi-Agent Systems
The current evolution of Information Technology leads to the increase of automatic data processing over multiple information systems. The data we deal with concerns sensitive infor...
Ludivine Crépin, Yves Demazeau, Olivier Boi...
124
Voted
CCS
2009
ACM
15 years 8 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
SOUPS
2009
ACM
15 years 8 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
124
Voted
CCS
2008
ACM
15 years 3 months ago
FairplayMP: a system for secure multi-party computation
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the great achievements of modern cryptograp...
Assaf Ben-David, Noam Nisan, Benny Pinkas
98
Voted
ISSA
2008
15 years 3 months ago
Lessons Learnt in the Process of Computerization, Automation and Management of ICT Security in the Developing World: A Case Stud
This paper intends to discuss and sift out current and important challenges in Information and Communication Technology (ICT) security for developing countries in the Sub-Saharan ...
Geoffrey Karokola, Louise Yngström