Sciweavers

5119 search results - page 132 / 1024
» Security Privacy
Sort
View
134
Voted
ACISP
2003
Springer
15 years 9 months ago
The Unsolvable Privacy Problem and Its Implications for Security Technologies
Abstract. Privacy presents many puzzles. In particular, why is it eroding, given the high value people assign to their privacy? This extended argues that there are strong incentive...
Andrew M. Odlyzko
CCS
2010
ACM
15 years 4 months ago
On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping
Secure "pairing" of wireless devices based on auxiliary or out-ofband (OOB)
Tzipora Halevi, Nitesh Saxena
IEEEARES
2009
IEEE
15 years 10 months ago
Linking Privacy Solutions to Developer Goals
Privacy is gaining importance since more and more data becomes digitalized. There is also a growing interest from the security community because of the existing synergy between se...
Kim Wuyts, Riccardo Scandariato, Bart De Decker, W...
SIGKDD
2002
172views more  SIGKDD 2002»
15 years 3 months ago
Data Mining, National Security, Privacy and Civil Liberties
In this paper, we describe the threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases. Keywor...
Bhavani M. Thuraisingham
SOUPS
2010
ACM
15 years 1 months ago
Influence of user perception, security needs, and social factors on device pairing method choices
Recent years have seen a proliferation of secure device pairing methods that try to improve both the usability and security of today's de-facto standard
Iulia Ion, Marc Langheinrich, Ponnurangam Kumaragu...