Sciweavers

474 search results - page 74 / 95
» Privacy suites: shared privacy for social networks
Sort
View
ICNP
2006
IEEE
15 years 5 months ago
Forensic Analysis for Epidemic Attacks in Federated Networks
— We present the design of a Network Forensic Alliance (NFA), to allow multiple administrative domains (ADs) to jointly locate the origin of epidemic spreading attacks. ADs in th...
Yinglian Xie, Vyas Sekar, Michael K. Reiter, Hui Z...
101
Voted
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
15 years 12 months ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang
IDTRUST
2009
ACM
15 years 6 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
CCS
2006
ACM
15 years 3 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
PUC
2000
142views more  PUC 2000»
14 years 11 months ago
Context-Aware Telephony Over WAP
In this paper we introduce a novel approach to share context to enhance the social quality of remote mobile communication. We provide an analysis of how people start a conversation...
Albrecht Schmidt, Antti Takaluoma, Jani Mänty...