Sciweavers

2656 search results - page 78 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
WMCSA
2012
IEEE
13 years 7 months ago
ACCessory: password inference using accelerometers on smartphones
We show that accelerometer readings are a powerful side channel that can be used to extract entire sequences of entered text on a smartphone touchscreen keyboard. This possibility...
Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig...
IHI
2012
217views Healthcare» more  IHI 2012»
13 years 7 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
P2P
2010
IEEE
136views Communications» more  P2P 2010»
14 years 9 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
CCS
2011
ACM
13 years 12 months ago
Privacy and accountability for location-based aggregate statistics
A significant and growing class of location-based mobile applications aggregate position data from individual devices at a server and compute aggregate statistics over these posi...
Raluca A. Popa, Andrew J. Blumberg, Hari Balakrish...
WISA
2004
Springer
15 years 5 months ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traf...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...