Sciweavers

2454 search results - page 39 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ISW
2010
Springer
14 years 7 months ago
Privacy-Preserving ECC-Based Grouping Proofs for RFID
The concept of grouping proofs has been introduced by Juels to permit RFID tags to generate a verifiable proof that they have been scanned simultaneously, even when readers or tags...
Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Sing...
GI
2005
Springer
15 years 3 months ago
Distributed User Modeling for Situated Interaction
: A distributed service to model and control contextual information in mobile and ubiquitous computing environments is presented in this paper. We introduce the general user model ...
Dominik Heckmann
IEEEARES
2009
IEEE
15 years 4 months ago
Measuring Voter-Controlled Privacy
—In voting, the notion of receipt-freeness has been proposed to express that a voter cannot gain any information to prove that she has voted in a certain way. It aims to prevent ...
Hugo L. Jonker, Sjouke Mauw, Jun Pang
CIKM
2007
Springer
15 years 3 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
ISI
2008
Springer
14 years 9 months ago
Secure remote control model for information appliances
Abstract--Recently, Lee et al. proposed a Remote Authentication Model of Information Appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network o...
Wen-Gong Shieh, Jian-Min Wang, Wen-Bing Horng