نشرت في: October 2009
In this article, we propose an access control mechanism for Web-based social networks, which adopts a rule-based approach for specifying access polic...
In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our contribution is twofold: (i) We propose a simple, formal defi...
We propose a class of anonymity attacks to both wired and wireless anonymity networks. These attacks are based on the blind source separation algorit...
نشرت في: February 2010
An alarming trend in recent malware incidents is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilit...
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local...