Sciweavers

5119 search results - page 153 / 1024
» Security Privacy
Sort
View
ISPEC
2005
Springer
15 years 9 months ago
Secure Software Delivery and Installation in Embedded Systems
ded abstract of this technical report appeared in the Proceedings of the First Information Security Practice and Experience Conference (ISPEC 2005) [AHS05].
André Adelsbach, Ulrich Huber, Ahmad-Reza S...
110
Voted
ESORICS
2005
Springer
15 years 9 months ago
Security Notions for Disk Encryption
We define security goals and attack models for disk encryption, and prove several relationships between the resulting security notions, and some general results about disk encryp...
Kristian Gjøsteen
162
Voted
SOUPS
2005
ACM
15 years 9 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
115
Voted
SDMW
2007
Springer
15 years 10 months ago
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems
Martin Boldt, Bengt Carlsson, Tobias Larsson, Nikl...