Sciweavers

2656 search results - page 79 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
90
Voted
ACSAC
2009
IEEE
15 years 6 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
IADIS
2004
15 years 1 months ago
A Context Aware User Profile for Personalization
With the emergence of the first 3G mobile technologies in everyday life, mobile phones and PDAs are able to function as more than just simple means of communication. Research on t...
D. Halvatzaras, M. Howard Williams
PERCOM
2005
ACM
15 years 11 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
WMTE
2006
IEEE
15 years 5 months ago
Handheld-Mediated Communication to Support the Effective Sharing of Meaning in Joint Activity
This paper reports the results of a laboratory study of a proposed solution to the problem of coordinating entry into collaborative activity while protecting the privacy and contr...
Kibum Kim, Deborah G. Tatar, Steve R. Harrison
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 6 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang