نتایج جستجو برای: untraceability
تعداد نتایج: 141 فیلتر نتایج به سال:
Radio frequency identification (RFID) chips have been widely deployed in large-scale systems such as inventory control and supply chain management. While RFID technology has much advantage, however it may create new problems to privacy. Tag untraceability is a significant concern that needs to be addressed in deploying RFID-based system. In this paper we propose a new construction for untraceab...
The existence of advanced smart devices and related technologies such as pervasive computing, mobile wireless communications, sensor networks and agent technologies have supported the proliferation of smart spaces. In this paper, we present the design of “Bosthan”, a multi-agent-based simulation tool that manages resources consumption in multi-inhabitants smart spaces. Bosthan is built on the t...
Secret Handshake is becoming an ever more popular research subject in the field of privacypreserving authentication protocols. Revocation of credentials in Secret Handshakes is a difficult challenge, as it mixes the conflicting requirements of tracing revoked users and of the untraceability and unlinkability of legitimate protocol players. The schemes proposed in the literature are either limit...
In this paper, we propose a secure rewarding scheme. I n the scheme, a reward provider publishes a problem, and provides a reward f o r a person who can supply h im a satisfactory solution of the problem. The first qualified claimant with satisfactory solution of the problem is selected to obtain the reward. The selected claimant can obtain the reward from the reward provider without revealing ...
This paper presents an overview of the current and next solutions for privacy protection on the Internet. We highlight five categories of Privacy Enhancing Technologies (PETS). First, we introduce the multiple virtual identities that can represent a person, and the way the person can manage them. Then, we focus on the untraceability problem, which has been a major field of research since the ve...
Near Field Communication (NFC) is an attractive technology which is used in several countries for contactless payment operations via mobiles. This technology is suffered from increasing the security weaknesses. In the NFC mobile payment systems, the payment operations are vulnerable to various attacks. Therefore, the authentication protocol in the NFC technology has the highest priority to deve...
Given the nature of health data, privacy of eHealth systems is of prime importance. An eHealth system must enforce that users remain private, even if they are bribed or coerced to reveal themselves or others. Consider e.g. a pharmaceutical company that bribes a pharmacist to reveal information which breaks a doctor’s privacy. In this paper, we identify and formalise several new but important pr...
Unmanned aerial vehicles have found applications in fields such as environmental monitoring and the military. Although collected data some of these application domains are sensitive, public channels deployed during communication process. Therefore, many protocols been presented to preserve confidentiality integrity exchanged messages. However, numerous security performance challenges noted majo...
Typical wearable devices use a dedicated mobile phone as relay node to transfer the collected sensor data server. However, such nodes can be faulty or inactive due various reasons, leading interruptions of communication link. To mitigate this challenge, we propose novel security-enhanced emergency situation detection system, where 3 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید