Sciweavers

5119 search results - page 220 / 1024
» Security Privacy
Sort
View
WPES
2004
ACM
15 years 10 months ago
Specifying privacy policies with P3P and EPAL: lessons learned
As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that d...
William H. Stufflebeam, Annie I. Antón, Qin...
WECWIS
2005
IEEE
116views ECommerce» more  WECWIS 2005»
15 years 10 months ago
Security and Privacy Using One-Round Zero-Knowledge Proofs
A zero-knowledge proof (ZKP) is an interactive proof that allows a prover to prove the knowledge of a secret to a verifier without revealing it. ZKPs are powerful tools to deal wi...
Sultan Almuhammadi, Clifford Neuman
INFOCOM
2008
IEEE
15 years 11 months ago
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications
Rongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho,...
AINA
2007
IEEE
15 years 10 months ago
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation
Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Taka...