Privacy and Identity Management for Life
5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers
Book and Conference Proceedings
5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers
Chapter and Conference Paper
With the growth of its popularity, VoIP is increasingly popular nowadays. Similarly to other Internet applications, VoIP users may desire to be unlinkable with their participated VoIP session records for priva...
Book and Conference Proceedings
6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers
Chapter and Conference Paper
Malicious intermediaries are able to detect the availability of VoIP conversation flows in a network and observe the IP addresses used by the conversation partners. However, it is insufficient to infer the cal...
Chapter and Conference Paper
To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when they enter PINs, their user-agent...
Chapter and Conference Paper
Trusted Computing (TC) can improve the security of various computing platforms. However, as new computing devices emerge and application scenarios increase, current trusted computing technology cannot satisfy ...
Chapter and Conference Paper
Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease...
Chapter and Conference Paper
Micro-video sharing is prevalent nowadays due to the rapid development of personal smart devices, fast growing of network bandwidth and the easy-to-use cloud computing. However, the micro-video sharing system ...
Chapter and Conference Paper
Wireless sensor networks (WSNs) are composed of huge amount of battery powered sensor nodes, which usually adopt sleep strategy to save energy and prolong network lifetime. Although appealing, such network fac...
Chapter and Conference Paper
The wireless sensor network is an important technology of the Internet of things. In the sensor network, the limited energy and uneven distribution of nodes lead to unbalanced load of nodes, and reduce the qua...
Chapter and Conference Paper
With the rapid development of unmanned aerial vehicle (UAV) technology in multiple fields, there are more and more scenarios needed to complete tasks through UAV communication and collaboration, and naturally,...
Chapter and Conference Paper
In recent years, because online shop** has the advantages of abundant products, easy selection, fast door-to-door delivery, and timely information feedback, people are more and more fond of online shop** c...
Book and Conference Proceedings
16th International Conference, ProvSec 2022, Nan**g, China, November 11–12, 2022, Proceedings