نتایج جستجو برای: untraceability

تعداد نتایج: 141  

Journal: :IACR Cryptology ePrint Archive 2009
Carlo Blundo Angelo De Caro Giuseppe Persiano

Radio frequency identification (RFID) chips have been widely deployed in large-scale systems such as inventory control and supply chain management. While RFID technology has much advantage, however it may create new problems to privacy. Tag untraceability is a significant concern that needs to be addressed in deploying RFID-based system. In this paper we propose a new construction for untraceab...

Journal: :JSW 2010
Sherin M. Moussa Gul A. Agha

The existence of advanced smart devices and related technologies such as pervasive computing, mobile wireless communications, sensor networks and agent technologies have supported the proliferation of smart spaces. In this paper, we present the design of “Bosthan”, a multi-agent-based simulation tool that manages resources consumption in multi-inhabitants smart spaces. Bosthan is built on the t...

2009
Alessandro Sorniotti Refik Molva

Secret Handshake is becoming an ever more popular research subject in the field of privacypreserving authentication protocols. Revocation of credentials in Secret Handshakes is a difficult challenge, as it mixes the conflicting requirements of tracing revoked users and of the untraceability and unlinkability of legitimate protocol players. The schemes proposed in the literature are either limit...

1997
Chun-I Fan Chin-Laung Lei

In this paper, we propose a secure rewarding scheme. I n the scheme, a reward provider publishes a problem, and provides a reward f o r a person who can supply h im a satisfactory solution of the problem. The first qualified claimant with satisfactory solution of the problem is selected to obtain the reward. The selected claimant can obtain the reward from the reward provider without revealing ...

Journal: :Annales des Télécommunications 2006
Yves Deswarte Carlos Aguilar Melchor

This paper presents an overview of the current and next solutions for privacy protection on the Internet. We highlight five categories of Privacy Enhancing Technologies (PETS). First, we introduce the multiple virtual identities that can represent a person, and the way the person can manage them. Then, we focus on the untraceability problem, which has been a major field of research since the ve...

2017
Shadi Nashwan

Near Field Communication (NFC) is an attractive technology which is used in several countries for contactless payment operations via mobiles. This technology is suffered from increasing the security weaknesses. In the NFC mobile payment systems, the payment operations are vulnerable to various attacks. Therefore, the authentication protocol in the NFC technology has the highest priority to deve...

2012
Naipeng Dong Hugo L. Jonker Jun Pang

Given the nature of health data, privacy of eHealth systems is of prime importance. An eHealth system must enforce that users remain private, even if they are bribed or coerced to reveal themselves or others. Consider e.g. a pharmaceutical company that bribes a pharmacist to reveal information which breaks a doctor’s privacy. In this paper, we identify and formalise several new but important pr...

Journal: :Electronics 2023

Unmanned aerial vehicles have found applications in fields such as environmental monitoring and the military. Although collected data some of these application domains are sensitive, public channels deployed during communication process. Therefore, many protocols been presented to preserve confidentiality integrity exchanged messages. However, numerous security performance challenges noted majo...

Journal: :IEEE open journal of the Computer Society 2021

Typical wearable devices use a dedicated mobile phone as relay node to transfer the collected sensor data server. However, such nodes can be faulty or inactive due various reasons, leading interruptions of communication link. To mitigate this challenge, we propose novel security-enhanced emergency situation detection system, where 3 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید