Now showing items 1-5 of 5

  • Colluding Tags Attack on the ECC-based Grouping Proofs for Rfids 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    Recently, a new privacy-preserving elliptic curve based grouping proof protocol with colluding tag prevention( CTP) has been proposed. The CTP protocol is claimed to be resistant against colluding tags attacks in which ...
  • I am not that interesting. Social media, privacy literacy, and the interplay between knowledge and experience 

    Rundhovde, Heidi Molvik (The University of Bergen, 2013-06-01)
    Sharing of personal information on the Internet has become increasingly popular. In social media interactions users face a trade-off between the pleasure and usefulness of sharing and the need to protect their privacy. ...
  • On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated against the tag owners as adversaries. The first protocol called ROTIV is a scheme which provides a privacy-preserving ...
  • Security Analysis of two Distance-Bounding Protocols 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestima ...
  • Towards Privacy Managment of Information Systems 

    Drageide, Vidar (The University of Bergen, 2009-06-02)
    This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing ...