The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
After the worldpsilas largest retailer, Wal-Mart, has implemented RFID (Radio Frequency Identification), the global suppliers are actively devoted to EPC (Electronic Product Code) research and development. Since RFID has advantages of a long life, safe, and free from environmental constraints, RFID EPC can achieve benefits such as saving manpower costs, expressing logistics management, reducing man-made...
Nowadays, the E-Commerce plays a very important role in peoples' life; many people like to shop on Internet. At the same time, people left so much information in Internet, which include the privacy information. Malicious users in Internet can get users' privacy information with directly or indirectly way. Traditional way is to protect the directly privacy. In this paper, we proposed a schema to prevent...
Nowadays, the e-commerce plays a very important role in peoplespsila life; many people like to shop on internet. At the same time, people left so much information in Internet, which include the privacy information. Malicious users in internet can get userspsila privacy information with directly or indirectly way. Traditional way is to protect the directly privacy. In this paper, we proposed a schema...
In the wake of the success of peer-to-peer networking, privacy has arisen as a big concern. Even though steps have been taken in order to attain an anonymous communications channel, all approaches consider the overlay network as a single entity and none of them take into account peer group based environments. In this paper, we describe a method in order to maintain unlinkability in group membership...
This paper focuses on the factors that influence the consumers' willingness to buy from an e-commerce vendor. We develop 4 structural equation models (SEM) integrated these factors to test our hypotheses. The result shows that perceived reputation, perceived risk and ease of use are positively associated with the level of consumers' willingness to buy, however, perceived size, perceived system assurance,...
In this paper, we present security primitives required to achieve privacy in content-based opportunistic networks. We define three privacy models adapted to content-based networking and detail what are the requirements that the security primitives have to achieve in order to fit in each of these models. We also propose an original approach based on multiple layer commutative encryption that features...
In this paper, we perform an empirical analysis of email traffic logs obtained from a large university to better understand the development of social networks. We analyzed data containing records of emails sent over a period of 10 months - the largest dataset we are aware of. We study the long term evolution of social networks on real world data. The initial analysis of data is followed by an exploration...
Ensuring security of software and computerized systems is a pervasive problem plaguing companies and institutions and affecting many areas of modern life. Software vulnerability may jeopardize information confidentiality and cause software failure leading tocatastrophic threats to humans or severe economic losses. Size, complexity, extensibility, connectivity and the search for cheap systems make...
Trustworthiness of resources is the foundation of virtual computing environments (VCE). Using identical information of resource is an ordinate method to achieve trustworthiness. However, it may conflict with identity privacy problem, an important security issue in VCE, that tries to make resource anonymous. A trust model is proposed to enhance resourcespsila identity privacy by changing pseudonym...
In this paper we introduce a new approach for RFID users' privacy protection that is in some sense complementary to well-known blocker tag due to Juels et al. The main idea behind our scheme is to add a special device called allower to a batch of tags in order to make reading RFID-tags possible. When the allower is switched-off reading is not possible. From the users' point of view functionality provided...
As the internet has been widely spread, it becomes big issues that an excessive demand of unnecessary private information at Web servers and invasion of privacy. Anonymous authentication technology is a solution of this problem. It can protect the personal information and guarantees the convenience which an Internet gives in our life. Anonymous authentication is an authentication method based on a...
This paper describes iPay, the local exchange trading systems developed by digital media in Italia, and the extensions developed to the digital media project interoperable DRM platform specification allowing the integration of the two specifications in a complete system for creating and distributing digital media, and remunerating its users for the content and the services provided. The solution presented...
Privacy is gaining importance since more and more data becomes digitalized. There is also a growing interest from the security community because of the existing synergy between security and privacy. Unfortunately, the privacy development life cycle is less advanced than the security one. A clear classification into different objectives is not available yet. This paper attempts to scope the privacy...
A protocol is secure if the parties who want to compute their inputs hands it to the trusted parties. Trusted parties in turn compute the inputs using the function f and give the result to the respective parties after computation in such a way that no party can identify other's party data. During computation of inputs, we had considered the factor, what if trusted third parties are malicious? Considering...
The uncertainties that currently exist about the efficacy of network data anonymization, from both technical and policy perspectives, leave the research community in a vulnerable position. Even as the field marches forward, it does so with little understanding of the implications of publishing anonymized network data on the privacy of the networks being monitored and the utility to researchers. Without...
AACS (advanced access content system) has been developed for preventing the piracy of digital contents using broadcast encryption scheme. AACS distinguishes just privileged devices from revoked devices. However, it isn't sufficient for protecting private digital contents created by general consumers who want to keep their private contents using recordable medias like DVD. This paper presents an improved...
Convex Hulls Problem is a special case of Privacy-preserving Geometry problems in the inquiry of Secure Multi-Party Computation (SMC). It can be applied in military, commercial and many other fields. However, because of the definition's inherent defect, current schemes will inevitably disclose the points on the vertices. In this paper, we proposed the concept of privacy-preserving approximate convex...
One of the main concerns preventing grid computing from being widely spread and utilized is the related security issues. Users in a grid are concerned about the protection of their resources and about their privacy. When a host interacts with a grid, its security may be threatened in terms of its data or its computational resources. We discuss the issue of ensuring host security and propose a solution...
Spyware is a kind of malicious code that is installed on victims' machines without their content. They spy on the users' behavior and compromise their privacy, while transmitting sensitive information to some remote servers. Current anti-spyware tools are similar to anti-virus products in that they identify known spyware by comparing the binary image to a database of signatures. Unfortunately, these...
Malware has posted a great risk to the privacy of users and data. Unfortunately, current anomaly detection is both coarse-grained and ineffective to detect them, because some behaviors can only be triggered in specific circumstances, moreover, it is difficult to analyze and evaluate compromised data. In this paper, we address the two problems via taint-based analysis. First, we precisely characterize...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.