Sciweavers

400 search results - page 60 / 80
» RFID Security: Tradeoffs between Security and Efficiency
Sort
View
CORR
2010
Springer
64views Education» more  CORR 2010»
14 years 10 months ago
Selfish Response to Epidemic Propagation
An epidemic spreading in a network calls for a decision on the part of the network members: They should decide whether to protect themselves or not. Their decision depends on the ...
George Theodorakopoulos, Jean-Yves Le Boudec, John...
SIGKDD
2002
90views more  SIGKDD 2002»
14 years 9 months ago
Database Privacy
The emphasis in database privacy should fall on a balance between confidentiality, integrity and availability of personal data, rather than on confidentiality alone. This balance ...
Martin S. Olivier
CHI
2010
ACM
15 years 4 months ago
Visual vs. compact: a comparison of privacy policy interfaces
In this paper, we compare the impact of two different privacy policy representations – AudienceView and Expandable Grids – on users modifying privacy policies for a social net...
Heather Richter Lipford, Jason Watson, Michael Whi...
INFOCOM
2009
IEEE
15 years 4 months ago
ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query
—With in-network sensor data storage and query, storage nodes are responsible for storing the data collected by sensor nodes and answering queries from users. Thus, without prope...
Nalin Subramanian, Ka Yang, Wensheng Zhang, Daji Q...
CIKM
2008
Springer
14 years 11 months ago
Cost-effective spam detection in p2p file-sharing systems
Spam is highly pervasive in P2P file-sharing systems and is difficult to detect automatically before actually downloading a file due to the insufficient and biased description of ...
Dongmei Jia