Sciweavers

2454 search results - page 57 / 491
» Privacy in the Information and Communications Technologies
Sort
View
IH
1998
Springer
15 years 5 months ago
Biometric yet Privacy Protecting Person Authentication
Many eligibility or entitlement certificates in every day life are non-transferable between persons. However, they are usually implemented by personal physical tokens that owners c...
Gerrit Bleumer
AISS
2010
114views more  AISS 2010»
14 years 10 months ago
Context Awareness Information Sharing Service based on Location-based Communication Policy
Since more networking technologies and communication channels have been developed, Internet users have moved their roles from being strictly information consumers to both informat...
Yih-Jiun Lee
INFOCOM
2011
IEEE
14 years 5 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
ISW
2009
Springer
15 years 8 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
COMCOM
2010
148views more  COMCOM 2010»
14 years 10 months ago
Privacy versus scalability in radio frequency identification systems
Embedding a Radio Frequency Identification (RFID) tag into individual items enables the unique identification of such items over the wireless medium, without the need for a line-o...
Basel Alomair, Radha Poovendran