Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Benjamin Kellermann"'
Publikováno v:
IFIP Advances in Information and Communication Technology
5th International Conference on Trust Management (TM)
5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.223-239, ⟨10.1007/978-3-642-22200-9_18⟩
Trust Management V ISBN: 9783642221996
IFIPTM
5th International Conference on Trust Management (TM)
5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.223-239, ⟨10.1007/978-3-642-22200-9_18⟩
Trust Management V ISBN: 9783642221996
IFIPTM
Part 2: Full Papers; International audience; Wikis are popular tools for creation and sharing of content. Integrated reputation systems allow to assess expertise and reliability of authors and thus to support trust in the wiki content. Yet, results f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::49c7339dbca07f55fcb31abeb92e911e
https://hal.inria.fr/hal-01568692/file/978-3-642-22200-9_18_Chapter.pdf
https://hal.inria.fr/hal-01568692/file/978-3-642-22200-9_18_Chapter.pdf
Autor:
Benjamin Kellermann
Publikováno v:
IFIP Advances in Information and Communication Technology
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.235-246, ⟨10.1007/978-3-642-21424-0_19⟩
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
SEC
26th International Information Security Conference (SEC)
26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.235-246, ⟨10.1007/978-3-642-21424-0_19⟩
IFIP Advances in Information and Communication Technology ISBN: 9783642214233
SEC
Part 7: Privacy Attacks and Privacy-Enhancing Technologies; International audience; Applications which help users to schedule events are becoming more and more important. A drawback of most existing applications is, that the preferences of all partic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d17e2497dbcd829b1c269c63c2247135
https://hal.inria.fr/hal-01567596/file/978-3-642-21424-0_19_Chapter.pdf
https://hal.inria.fr/hal-01567596/file/978-3-642-21424-0_19_Chapter.pdf
Autor:
Benjamin Kellermann
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642192272
iNetSec
Lecture Notes in Computer Science
1st Open Research Problems in Network Security (iNetSec)
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.9-19, ⟨10.1007/978-3-642-19228-9_2⟩
iNetSec
Lecture Notes in Computer Science
1st Open Research Problems in Network Security (iNetSec)
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.9-19, ⟨10.1007/978-3-642-19228-9_2⟩
Part 1: Invited Talk and Scheduling; International audience; Event-scheduling applications like Doodle have the problem of privacy relevant information leakage. A simple idea to prevent this would be to use an e-voting scheme instead.However, this so
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d27a17baa2b90679e5dbedbcfd3b5c47
https://doi.org/10.1007/978-3-642-19228-9_2
https://doi.org/10.1007/978-3-642-19228-9_2
Autor:
Karel Wouters, Stefanie Pötzsch, Stefano Paraboschi, Jan Camenisch, Pierangela Samarati, Stefan Köpsell, Benjamin Kellermann, Dave Raggett, Franz-Stefan Preiss
Publikováno v:
Privacy and Identity Management for Life ISBN: 9783642203169
Privacy and Identity Management for Life
Privacy and Identity Management for Life
Privacy protection tools can be characterised by the number of parties that have to cooperate so that the tools work and achieve the desired effect [Pfi01]: Some privacy protection tools can be used stand-alone, without the need for the cooperation o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::412b76964e57117ee5865bc6e868e43d
https://doi.org/10.1007/978-3-642-20317-6_24
https://doi.org/10.1007/978-3-642-20317-6_24
Autor:
Jan Camenisch, Sandra Steinbrecher, Laura Klaming, Benjamin Kellermann, Ronald Leenes, Stefanie Pötzsch
Publikováno v:
Privacy and Identity Management for Life ISBN: 9783642203169
Privacy and Identity Management for Life
Privacy and Identity Management for Life
Some decades ago content on which people base important judgment used to be provided by relatively few, institutional sources like Encyclopedias. Since the 1990s the Internet has become an invaluable source of information for a growing number of peop
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::217cfd2e692f981e378c6873566da119
https://doi.org/10.1007/978-3-642-20317-6_3
https://doi.org/10.1007/978-3-642-20317-6_3
Autor:
Benjamin Kellermann, Immanuel Scholz
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783642142819
Web applications dealing with personal data in a privacy-friendly way have the need for anonymous credential systems. While there are already protocols describing anonymous credential systems and libraries, implementing the protocols, application usi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f05851bf5d48aa9358ed4666d54f315f
https://doi.org/10.1007/978-3-642-14282-6_19
https://doi.org/10.1007/978-3-642-14282-6_19
Autor:
Rainer Böhme, Benjamin Kellermann
Publikováno v:
CSE (3)
Event schedulers, well-known from groupware and social software, typicallyshare the problem that they disclose detailed availability patterns of theirusers. This paper distinguishes event scheduling from electronic voting andproposes a privacy-enhanc