Sciweavers

2454 search results - page 57 / 491
» Privacy in the Information and Communications Technologies
Sort
View
IH
1998
Springer
15 years 2 months ago
Biometric yet Privacy Protecting Person Authentication
Many eligibility or entitlement certificates in every day life are non-transferable between persons. However, they are usually implemented by personal physical tokens that owners c...
Gerrit Bleumer
AISS
2010
114views more  AISS 2010»
14 years 7 months ago
Context Awareness Information Sharing Service based on Location-based Communication Policy
Since more networking technologies and communication channels have been developed, Internet users have moved their roles from being strictly information consumers to both informat...
Yih-Jiun Lee
INFOCOM
2011
IEEE
14 years 1 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
ISW
2009
Springer
15 years 4 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
COMCOM
2010
148views more  COMCOM 2010»
14 years 7 months ago
Privacy versus scalability in radio frequency identification systems
Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-o...
Basel Alomair, Radha Poovendran