Dislocation 发表于 2025-3-28 14:59:32

Personalized Mobile Services with Lightweight Security in a Sports Associationungsters and makes use of a contactless RFID chip embedded in a bracelet. It realizes a reasonable trade-off between multiple (often conflicting) requirements, namely low-cost and low-power, security, privacy and flexibility to allow for easily adding new services.

粗野 发表于 2025-3-28 22:33:01

User Authentication for Online Applications Using a USB-Based Trust Device which guarantees trusted behavior at multiple layers; from the hardware device itself, to the software executing on the hardware, and finally to the application hosted in the remote server. This combination assures end-to-end trust and makes our system resilient to physical attacks (e.g. to the dev

斥责 发表于 2025-3-29 01:23:14

XtreemOS-MD SSO as part of XtreemOS project, but it may be reused by any other project. It offers semi-transparent integration with applications and makes easier the migration from enterprise servers to cloud computing infrastructures..XtreemOS-MD SSO is inspired in Linux Key Retention Service (LKRS) with some enh

Freeze 发表于 2025-3-29 06:50:17

http://reply.papertrans.cn/87/8636/863514/863514_44.png

低位的人或事 发表于 2025-3-29 10:50:31

Enhancing Privacy-Preserving Access Control for Pervasive Computing Environmentsproviders require user authentication and authorization prior to the provision of a service, while at the same time users require anonymity, ., untraceability and unlinkability for their transactions. In this paper we discuss privacy and security requirements for access control in PCEs and show why

安慰 发表于 2025-3-29 11:47:35

http://reply.papertrans.cn/87/8636/863514/863514_46.png

过剩 发表于 2025-3-29 15:34:22

A Privacy-Enabled Architecture for Location-Based Servicese the user with high-quality Location-Based Service browsing and powerful mechanisms to reduce the amount of location data transmitted such a platform is dangerous as it has to manage the location data of the users and the actual service usage. This aggregation of private data is a risk in itself. W

受辱 发表于 2025-3-29 19:52:54

http://reply.papertrans.cn/87/8636/863514/863514_48.png

小故事 发表于 2025-3-30 02:46:25

Optimized Resource Access Control in Shared Sensor Networksting the network from threats originating from the hostile outside has been ongoing. Additionally, many real world applications of sensor networks move away from the monolithic application model – node capabilities need to be shared among different applications of different actors. This view introdu

In-Situ 发表于 2025-3-30 04:35:06

http://reply.papertrans.cn/87/8636/863514/863514_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Security and Privacy in Mobile Information and Communication Systems; Second International Andreas U. Schmidt,Giovanni Russello,Shiguo Lian