The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Human activity recognition (HAR) has become an important emerging field of application for sensor networks (SN) technologies. Nevertheless, the pervasiveness of SN in everyday life has given rise to new privacy concerns especially when mining personal sensed data in external environments. From that perspective, many research works have proposed cryptography-based techniques so as to tackle SN privacy...
This paper is concerned with RFID tagged objects in a supply chain management system. Such objects are read by multiple readers both in known locations (secure zone with online readers) as well as unknown locations (insecure zone with offline readers). In the secure zone, the primary requirement is to read a large number of tags with high speed. In the insecure zone, the primary requirement is to...
Relationshion-based access control (ReBAC) is today emerging as a de-facto standard for On-line Social Network (OSN) access control. However, although several proposals exist of ReBAC models, no extensive performance evaluations have been conducted so far. In this paper, we carried out several experiments on different datasets to study the overhead implied by ReBAC and how it scales when increasing...
Recently, Tsukada et al. propose to use multi-agent epistemic logic for a taxonomy of information-hiding/disclosure properties, in particular properties used in authentication protocols. We follow their proposal and introduce a new multi-agent justification logic for protocol analysis and verification. We show our logic at work analyzing a non-repudiation protocol due to Zhou and Gollmann. Based on...
The last ten years witnessed a sustained effort aimed at developing a formalism appropriate for rigorous reasoning about information hiding related properties. Among the various existent proposals one can distinguish the highly general approach of Halpern and O'Neil that employs a simple epistemic logic in the context of a multi-agent system. Still, in the context of the same formalism, basic concepts...
Recently, a new privacy-preserving elliptic curve based grouping proof protocol with colluding tag prevention (CTP) has been proposed. The CTP protocol is claimed to be resistant against colluding tags attacks in which the involved tags can exchange some messages via another reader before the protocol starts without revealing their private keys. In this paper, we show that the CTP protocol is vulnerable...
Efficient and privacy-preserving data aggregation in a wireless sensor network (WSN) poses a tremendous challenge: how to cope with sensors compromise-once a sensor is compromised, its crypto material is compromised and so is privacy of aggregate data. To address this challenge, we propose two operationally simple and privacy-preserving protocols: PASKOS (Privacy-preserving based on Anonymously Shared...
Protection of On-line Social Networks (OSNs) resources has become a primary need since today OSNs are the hugest repository of personal information on the Web. This has resulted in the definition of some access control models tailored to the protection of OSN resources. One of the key parameter on which access control decisions in OSNs should be based is represented by the trust between OSN users...
Though security and privacy are two important issues in vehicular networks, limited works are done on the design of communication protocol until recently. Several proposals tackle these issues in the cryptographic way, such as using group signature to construct vehicular communication protocol. The proprieties of anonymity and traceability make group signature to the purpose to be used in designing...
Mobile devices able to locate themselves such as mobile phones and PDAs are virtually everywhere, and they are expected to gain more importance in the near future. Their ability to determine locations opens the door to a new bunch of services: the so-called location-based services (LBS). The commercial sector will highly benefit from LBS. However, they are not without a cost - privacy. In this article...
The rise of new Internet services, especially those related to the integration of people and physical objects to the net, makes visible the limitations of the DNS protocol. The exchange of data through DNS procedures flows today into hostile networks as clear text. Packets within this exchange can easily be captured by intermediary nodes in the resolution path and eventually disclosed. Privacy issues...
We propose an extension of the attribute exchange between an identity provider (IdP) and an service provider (SP) in Shibboleth. While in the conventional framework of Shibboleth attributes are exchanged in immediate values, in our new extension an SP and an IdP exchange attributes according to so-called "magic protocols". This extension enables the SP to know whether user's attributes meet...
RFID technology is widely used worldwide in a broad range of applications. Such technology however raises security concerns about the protection of the information stored in the RFID tags and exchanged during the wireless communication with the readers. In this work we propose an efficient protocol for tag identification which improves on previous proposals and provides an increased level of security,...
Privacy policy languages, such as P3P, allow websites to publish their privacy practices and policies in machine readable form. Software agents designed to protect users' privacy follow a "take it or leave it" approach that is inflexible and gives the server ultimate control. Privacy policy negotiation is one approach to leveling the playing field by allowing a client to negotiate with a...
Mobile communication devices have rapidly proliferated in all developed countries. Most of these devices can determine their location, and their computation and storage capacities have greatly increased in recent years. Therefore, location-based services (LBS) will become cornerstones of the new information society. Most of the time, LBS are provided by trusted companies such as telecommunications...
In a true ubiquitous world, RFID tags will be available in everything, everywhere, and at all times. However, since those tags are bounded with constraints, with no foolproof method to manage the changing hands of the same-tagged item, there is no assurance of privacy and security in passive tags. Yet there are several vender specific solutions but none of them comprehensively solve the security risks...
Privacy is ultimately important, and there is a fair amount of research about it. However, few empirical studies about the cost of privacy are conducted. In the area of secure multiparty computation, the scalar product has long been reckoned as one of the most promising building blocks in place of the classic logic gates. The reason is not only the scalar product complete, which is as good as logic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.