Showing 1 - 10 of 120
In this thesis we discuss two demanding problems from the field of computer and communication security that involve …, other than in traditional computer security problems, the adversary has a lot of control over the situation. The untrusted … ways: We propose relaxed, but still practically useful, notions of security for the DSP problem; we identify theoretical …
Persistent link: https://www.econbiz.de/10009467070
nicht voll vertrauenswŸrdigen Dienstanbieter betrachtet. Wir untersuchen die Grenzen der Sicherheit, die in diesem Szenario … erreicht werden kšnnen. Sicherheit wird dabei unter Zuhilfenahme aktueller komplexitŠtstheoretischer Arbeiten definiert. Dies … ermšglicht die Verwendung formaler Methoden zur Untersuchung der Bedingungen, unter denen verschiedene Grade von Sicherheit …
Persistent link: https://www.econbiz.de/10009467071
herausgearbeitet, wobei insbesondere mehrseitige Sicherheit und die Perspektive der IOTNS-Clients berŸcksichtigt werden, die in den … information about this object. This thesis discusses the information security challenges involved in the design and use of an IOT … discussed, including multilateral security and the client perspective, which have been neglected in IOT standards and research …
Persistent link: https://www.econbiz.de/10009467072
architecture in an untrusted three-party environment Using a privacy-compromising health report as a running example through the …
Persistent link: https://www.econbiz.de/10009467121
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information Technology and the increasing collection and use of...
Persistent link: https://www.econbiz.de/10009434833
disadvantages such as security, privacy, reliability, physical location of data and the unavailability of service due to crashes or …
Persistent link: https://www.econbiz.de/10009434867
When considering information security and privacy issues most of the attention has previously focused on data … operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of … new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and …
Persistent link: https://www.econbiz.de/10009434918
Privacy is a very diverse field of research and due to its subjective nature, open to many interpretations and representations. Information Privacy forms a key component of Privacy related to research, particularly its importance to Information Technology and the increasing collection and use of...
Persistent link: https://www.econbiz.de/10009434924
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating...
Persistent link: https://www.econbiz.de/10009434970
When considering information security and privacy issues most of the attention has previously focussed on data … operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of … new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and …
Persistent link: https://www.econbiz.de/10009434971