Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2011
Privacy-preserving activity scheduling on mobile devices
CODASPY '11: Proceedings of the first ACM conference on Data and application security and privacyPages 261–272https://doi.org/10.1145/1943513.1943549Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users' personal schedules. Users also access popular context-based services, typically provided by third-party providers, by using these ...
- research-articleFebruary 2011
Identifying a critical threat to privacy through automatic image classification
CODASPY '11: Proceedings of the first ACM conference on Data and application security and privacyPages 157–168https://doi.org/10.1145/1943513.1943535Image classification, in general, is considered a hard problem, though it is necessary for many useful applications such as automatic target recognition. Indeed, no general methods exist that can work in varying scenarios and still achieve good ...
- keynoteFebruary 2011
Key dependent message security: recent results and applications
CODASPY '11: Proceedings of the first ACM conference on Data and application security and privacyPages 3–12https://doi.org/10.1145/1943513.1943516An encryption scheme is Key Dependent Message (KDM) secure if it is secure even against an attacker who has access to encryptions of messages which depend on the secret key. Recent studies have revealed that this strong security notion is important both ...