Sciweavers

677 search results - page 9 / 136
» Secure Pseudonymous Channels
Sort
View
AINA
2011
IEEE
14 years 1 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor
CCS
2010
ACM
14 years 9 months ago
On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping
Secure "pairing" of wireless devices based on auxiliary or out-ofband (OOB)
Tzipora Halevi, Nitesh Saxena
68
Voted
CCS
2009
ACM
15 years 4 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 4 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll