نتایج جستجو برای: untraceability
تعداد نتایج: 141 فیلتر نتایج به سال:
Many RFID authentication protocols have been proposed to preserve security and privacy. Nevertheless, most of these protocols are analyzed and it is shown that they can not provide security against some RFID attacks. Moreover, some of the secure ones are criticized, because they suffer from scalability at the reader/server side as in tag identification or authentication phase they require a lin...
Incorporating the property of untraceability of payments into oo-line electronic cash systems has turned out to be no easy matter. Two key concepts have been proposed in order to attain the same level of security against double-spending as can be trivially attained in systems with full traceability of payments. The rst of these, one-show blind signatures, ensures traceability of double-spenders...
Privacy properties such as untraceability, vote secrecy, or anonymity are typically expressed asbehavioural equivalence in a process algebra that models security protocols. In this paper, we study how todecide one particular relation, namely trace equivalence, for an unbounded number of sessions.Our first main contribution is to reduce the search space for attacks. Specifically, we ...
Can online trackers and network adversaries de-anonymize web browsing data readily available to them? We show— theoretically, via simulation, and through experiments on real user data—that de-identified web browsing histories can be linked to social media profiles using only publicly available data. Our approach is based on a simple observation: each person has a distinctive social network, and...
Data is one of the most important resources to organization and any loss or lack of access could lead to many problems, so the data should be transmitted with security. Although encryption was used to hide the contents of transmitted data, it does not hide the identity of the communicating parties and it does not prevent traffic analysis.Anonymity in a communication context, also known as untra...
The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases, the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...
OF THE DISSERTATION Security and Privacy in Location-Based Mobile Ad-Hoc Networks By Karim El Defrawy Doctor of Philosophy in Networked Systems University of California, Irvine, 2010 Professor Gene Tsudik, Chair In the last two decades, research in various aspects of mobile ad-hoc networks, MANETs, has been very active, motivated mainly by military, disaster relief and law enforcement scenarios...
for SSCW-2004 March 14, 2004 Secret ballots were introduced for public elections in Australia, followed by the U.S., in the latter half of the 19 Century. The ostensible reason for their introduction was to prevent coercion by employers and political parties, who often controlled the printing and distribution of ballots and could thus prevent their supporters from deviating from the “party line...
The development of new applications of electronic commerce (e-commerce) that require the payment of small amounts of money to purchase services or goods opens new challenges in the security and privacy fields. These payments are called micropayments and they provide a trade-off between efficiency and security requirements to pay low-value items. It is usual to assume low value fraud to achieve ...
Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices. In this context, it is widely argued that security has become a primary concern, in order to ensure dependable, secure communications and services to the end user. There are many open questions for these challenging...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید