Filters








87 Hits in 16.0 sec

Table of Contents

2019 IEEE Communications Standards Magazine  
Attribute-Based Credentials: What if Alice Is Evil?  ...  BalasuBramanya, lutz lamPe, Gustav vos, DaviD W chaDWicK, romain laBorDe, arnauD oGlaza, remi venant, samer Wazan, anD manreet niJJar Zero-Knowledge Proofs Do Not Solve the Privacy-Trust Problem of  ... 
doi:10.1109/mcomstd.2019.9031538 fatcat:lykbzdobdzfmzcjmrfjhjvmcp4

Point-Based Trust: Define How Much Privacy Is Worth [chapter]

Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia
2006 Lecture Notes in Computer Science  
Alice's privacy-valuation of her credentials is also private.  ...  This paper studies the notion of point-based policies for trust management, and gives protocols for realizing them in a disclosure-minimizing fashion.  ...  Acknowledgements We would like to thank Nikos Triandopoulos, Seth Proctor, and Kimberly Perzel for helpful comments on an earlier version of the point-based trust management model, and Aris Anagnostopoulos  ... 
doi:10.1007/11935308_14 fatcat:6z65peo76vbwzdqlvsqpwtvhxy

Decentralized Identity: Where Did It Come From and Where Is It Going?

Oscar Avellaneda, Alan Bachmann, Abbie Barbir, Joni Brenan, Pamela Dingle, Kim Hamilton Duffy, Eve Maler, Drummond Reed, Manu Sporny
2019 IEEE Communications Standards Magazine  
The article "Zero-Knowledge Proofs Do Not Solve the Privacy-Trust Problem of Attribute-Based Credentials: What if Alice Is Evil?"  ...  considers the use of zero-knowledge proofs for enhancing security and privacy. The success of these new architectures requires usable privacy controls.  ... 
doi:10.1109/mcomstd.2019.9031542 fatcat:22xabhot7zcnpaldcz4vbn63ty

Techniques, Taxonomy, and Challenges of Privacy Protection in the Smart Grid [chapter]

Suleyman Uludag, Sherali Zeadally, Mohamad Badra
2015 Computer Communications and Networks  
What makes the SG privacy even more challenging and intriguing is the fact that the very success of the initiative depends on the expanded data generation, sharing, and processing.  ...  Along these lines, this chapter introduces some of the privacy issues and problems in the domain of the SG, develops a unique taxonomy of some of the recently proposed privacy protecting solutions as well  ...  A zero-knowledge proof of knowledge [13] is a two-party protocol between a prover and a verifier.  ... 
doi:10.1007/978-3-319-08470-1_15 fatcat:eidtx25w2nc6rpl2b6uvcrblqi

Rights protection for categorical data

R. Sion, M. Atallah, S. Prabhakar
2005 IEEE Transactions on Knowledge and Data Engineering  
Mark detection is fully "blind" in that it doesn't require the original data, an important characteristic, especially in the case of massive data.  ...  A novel method of rights protection for categorical data through watermarking is introduced in this paper.  ...  ACKNOWLEDGMENTS The authors would like to thank the anonymous reviewers for helpful comments. Portions of this work were  ... 
doi:10.1109/tkde.2005.116 fatcat:kbuk3vo37zbdpmqbqdr6dz4wpm

Forget-me-block: Exploring digital preservation strategies using Distributed Ledger Technology in the context of personal information management [article]

James David Hackman
2020 arXiv   pre-print
The reality however is that digital records suffer similar risks of access loss as the analogue versions they replace. Often this risk is outsourced to specialised third parties.  ...  employee leaves the company, the IS provider pivots to new offerings.  ...  known as 'Proof of Work' -a race to solve a computationally difficult puzzle.  ... 
arXiv:2011.05759v1 fatcat:hrfkb56k7nhjde3i7bw6g7iclu

Centralized Management of Virtual Security Zones in IP Networks [chapter]

Antti Peltonen, Teemupekka Virtanen, Esa Turtiainen
2004 Lecture Notes in Computer Science  
The node configuration that is used to enforce the desired security policy, is typically set up by hand, node by node. This is not only time consuming, but also very error prone.  ...  Esa Turtiainen The growing security awareness among business users of networks based on Internet Protocol (IP) has emerged a need to control the security policies of the network nodes.  ...  Our own implementation is restricted to only custom made software components as we do not have the knowledge nor equipment for manufacturing hardware based solutions.  ... 
doi:10.1007/978-3-540-24852-1_7 fatcat:dz6ba6avpzbg5jgnirlt5k2esy

The Philosophy of Stanley Kubrick

2007 ChoiceReviews  
The goal of this series is to demonstrate how philosophical inquiry has been reinvigorated by increased scholarly interest in the intersection of popular culture and philosophy, as well as to explore through  ...  The books published in the Philosophy of Popular Culture series will illuminate and explore philosophical themes and ideas that occur in popular culture.  ...  and therefore not a virtue)-as well as roads to solving those problems.  ... 
doi:10.5860/choice.45-0222 fatcat:udag3jv23jdqhopgcge4ibvvk4

Reputation Systems for Anonymous Networks [chapter]

Elli Androulaki, Seung Geol Choi, Steven M. Bellovin, Tal Malkin
Lecture Notes in Computer Science  
Misbehavior is one of the biggest problems in pseudonymous P2P systems, where there is little incentive for proper behavior.  ...  In our scheme, using ecash for reputation points, the reputation of each user is closely related to his real identity rather than to his current pseudonym.  ...  We would like to thank Patrick Tsang, Apu Kapadia, and anonymous referees for helpful comments on the paper.  ... 
doi:10.1007/978-3-540-70630-4_13 fatcat:6rvzxbetjnervndvq3ojrxl6dy

Approaches for simplified hotspot logins with Wi-Fi devices

Patrick Wiederkehr
2009
This thesis presents an overview of the different approaches for Wi-Fi login, with particular focus on public hotspots. This mainly involves solving the authentication problem.  ...  Today, public hotspots are not as secure as they could be if they implemented current standards and protocols for secure wireless networking.  ...  Zero-Knowledge Password Proofs Zero-Knowledge Password Proofs (ZKPPs) are based on so-called zero knowledge proofs, where an entity knowing a secret must prove that it knows the secret, without giving  ... 
doi:10.3929/ethz-a-005899210 fatcat:d2jpkhkoufhprppctw5w4bmqey

Native to the Nation: Disciplining Landscapes and Bodies in Australia

James Jupp
2005 Perspectives on Politics  
Certainly, past guerrilla wars have shown that a policy of resettling a segment of the population is usually not effective if the resettlement centers do not have an economic base.  ...  arguments serve to solve this problem.  ... 
doi:10.1017/s1537592705650256 fatcat:3wqjyrwjizbx7lrmtwszp4dgne

Scaling up VoIP: Transport Protocols and Controlling Unwanted Communication Requests

Kumiko Ono
2017
The use of SCTP, on the other hand, requires improving the Linux implementation since the not-well-tested implementation makes a server less scalable.  ...  From ITSPs' perspective, the scalability of VoIP servers is of importance and concern. Scalability depends on server implementation and the transport protocol for SIP, VoIP signaling.  ...  Thus, similar to affiliation-based trust relationships, attribute credentials represent the concept of trust based on credentials.  ... 
doi:10.7916/d83f4wrk fatcat:yigabivuezgxfe2sukj5z3esoa

Rape in the Criminal Justice System

David P. Bryden, Sonja Lengnick
1997 Journal of criminal law & criminology  
But bias and the burden of proof usually solve the defendant's problem while compounding the acquaintance rape victim's problem.  ...  (After all, the jury is also legally entitled to acquit.) In our hypothetical case, with proof problems that are presumably typical of many acquaintance rapes, what should the jury do?  ...  This is not to say that excessive police skepticism is harmless. Unfair treatment of a crime victim is still unfair, even if it does not affect the likelihood that the offender will be punished.  ... 
doi:10.2307/1144018 fatcat:uqxoddoicvhifjgvxsp4si32oq

Critical theories of crisis in Europe: from Weimar to the euro

Romain Bonnet
2017 European Review of History  
Books in the series provide alternative accounts and points of view regarding the development of critical social theory, put critical theory in dialogue with other intellectual traditions around the world  ...  and/or advance new, radical forms of pluralist critical theory that contest the current hegemonic order.  ...  they like, so long as they do not act, and especially do not resort to violence, upon the basis of what they think.  ... 
doi:10.1080/13507486.2017.1317054 fatcat:5vmidwzfebhdnbloy5aagxukhq

Martin Heidegger on Science and Technology: It's Implication to the Society

Peter Alawa
2013 IOSR Journal of Humanities and Social Science  
In this work, I wish to make us aware of certain elements which might prove destructive to our society, if they are not properly guarded against in our bid to reach the apex of science and technology.  ...  therefore, the men of science and technology should not produce things that will bring progress to man.  ...  Acknowledgement This paper was presented at the National Workshop on "Non-Resident Indian (NRI) Marriages: Need for a New Legal Regime" conducted by NALSAR University of Law, Hyderabad on February 2, 2013  ... 
doi:10.9790/0837-1260105 fatcat:qmmxca43wrgitb5azy2isq5rzm
« Previous Showing results 1 — 15 out of 87 results