• Aucun résultat trouvé

Security and privacy → Privacy-preserving protocols

Security and privacy in RFID systems

Security and privacy in RFID systems

... Conclusion and Future Work ...of privacy and security threats that range from denial of service to industrial ...tag security and privacy while keeping the computational ...

228

Preserving privacy in speaker and speech characterisation

Preserving privacy in speaker and speech characterisation

... inversion and log-determinants and the definition of effective data protection ...Moreover, privacy-preserving comparison and inference systems will need to meet real-time ...

41

Privacy-preserving and secure location authentication

Privacy-preserving and secure location authentication

... of security and ...the protocols and how we can remedy to ...frauds and attacks inspired from the domain distance-bounding protocol and ...threats and give scenarios to ...

128

Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions

Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions

... ) and ProjHash(hp, (L, param), W, w) outputs the hash value, either from the hashing key, or from the projection key and the ...The security of a SPHF is defined through two different notions, the ...

29

A Survey of Privacy Preserving Reputation Systems

A Survey of Privacy Preserving Reputation Systems

... withdraw and deposit ...updated and demonstrated in a way such that anonymity is not compro- ...user and his pseudonyms, and unlinkability among pseudonyms of the same ...systems and ...

54

Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase

Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase

... drawers and possible sizes of a ...of preserving privacy of individuals in a biometric ...group, and the domicile region of a ...biometric and identity as- sociation), the identity of a ...

9

Homomorphic Cryptography-based Privacy-Preserving Network Communications

Homomorphic Cryptography-based Privacy-Preserving Network Communications

... knowledge, and although it is straightforward in small examples, this task is uneasy in ...Alice and Bob participate in the network, and that they are likely to com- ...the privacy is ...

28

From speech privacy to speech security

From speech privacy to speech security

... Speech Privacy Design Goals for Open-Plan Offices Concerning acoustical design goals it was a generally accepted that one should strive to achieve conditions in which AI ≤ ...changed and the new version ...

17

Privacy-preserving carpooling

Privacy-preserving carpooling

... (PSI) protocols is based on oblivious polyno- mial evaluations and interpolations ...roots and evaluate this polynomial ...location and a method of travel (walking, biking, public transit, ...

5

Symbolic verification of privacy-type properties for security protocols with XOR (extended version)

Symbolic verification of privacy-type properties for security protocols with XOR (extended version)

... such protocols are described in ...end, and another where a wrong password (modeled through a fresh name) is revealed [24], ...A and B (and the trusted third party S when ...

30

Security and privacy issues in cloud computing

Security and privacy issues in cloud computing

... Pakistan, and Saudi Arabia: a mobile cloud computing perspective^ by Rooh ul Amin, Irum Inayat, Basit Shahzad, Kashif Saleem, and Li Aijun conducted an empirical study to investigate the behav- ioral ...

4

Security and privacy in online social networks

Security and privacy in online social networks

... user and hence having access to the information related to its relations and data, Safebook denes for each user a particular structure named as Matryoshkas ensuring end-to-end conden- tiality and ...

230

Task-Tuning in Privacy-Preserving Crowdsourcing Platforms

Task-Tuning in Privacy-Preserving Crowdsourcing Platforms

... tion and its ...document and com- ...defined and outputs the space partitioning computed. Finally and most importantly, the audience uses our simple task tuning helper in order to tune a few ...

5

Secretive Birds: Privacy in Population Protocols

Secretive Birds: Privacy in Population Protocols

... infrastructure and the mass pro- duction that might render it difficult to assign unique identifiers to agents or to programme them ...identifiers and a simple randomized procedure can generate distinct ...

14

User Perceptions of Privacy and Security on the Web

User Perceptions of Privacy and Security on the Web

... encrypt and digitally sign e-mail, but even experienced computer users have difficulty performing the simplest of these tasks ...cited, and the situation has not improved significantly in the six years ...

14

Capturing Privacy-preserving User Contexts with IndoorHash

Capturing Privacy-preserving User Contexts with IndoorHash

... addresses and the associated GPS lo- cation ...user privacy, as a rainbow table could be created for all the ...hash and therefore reduces the risk to infer the physical location captured by a given ...

18

Preserving differential privacy under finite-precision semantics

Preserving differential privacy under finite-precision semantics

... differential privacy, an approach to privacy that emerged from the area of statistical databases and is now widely applied also in other ...approach, privacy is protected by the addition of ...

19

Minimal Observability and Privacy Preserving Compensation for Transactional Services

Minimal Observability and Privacy Preserving Compensation for Transactional Services

... algorithms and integrated them into the ActiveBpel [1] ...scope and compensating operations are associated with the ...AeActivityScopeImpl and the information that might be needed to compensate it is ...

28

Scalable and Privacy-Preserving Admission Control for Smart Grids

Scalable and Privacy-Preserving Admission Control for Smart Grids

... intelligence and communication capabilities may be introduced through smart plugs , without the need to replace older “dumb" ...start, and the controller will limit the number of simultaneously active ...

30

Distributed Privacy Preserving Platform for Ridesharing Services

Distributed Privacy Preserving Platform for Ridesharing Services

... address and port number to use). The message contains the nonce and the random number used by the client to generate the nonce, the client’s ID, public key, and rank, the exact origin and ...

7

Show all 10000 documents...

Sujets connexes