Sciweavers

677 search results - page 17 / 136
» Secure Pseudonymous Channels
Sort
View
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
15 years 2 months ago
A reputation system for selling human computation
We describe a reputation-driven market that motivates human computation sellers (workers) to produce optimal levels of quality when quality is not immediately measurable and contr...
Trevor Burnham, Rahul Sami
JCM
2007
143views more  JCM 2007»
14 years 9 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
JNCA
2011
185views more  JNCA 2011»
14 years 4 months ago
Design of a secure distance-bounding channel for RFID
Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols...
Gerhard P. Hancke
CORR
2010
Springer
114views Education» more  CORR 2010»
14 years 4 months ago
Secure Communication over Parallel Relay Channel
We investigate the problem of secure communication over parallel relay channel in the presence of a passive eavesdropper. We consider a four terminal relay-eavesdropper channel wh...
Zohaib Hassan Awan, Abdellatif Zaidi, Luc Vandendo...
61
Voted
CORR
2010
Springer
148views Education» more  CORR 2010»
14 years 9 months ago
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channel...
Pedro C. Pinto, João Barros, Moe Z. Win