Sciweavers

167 search results - page 33 / 34
» A Game-Theoretic Approach to Anonymous Networking
Sort
View
FC
2008
Springer
82views Cryptology» more  FC 2008»
13 years 9 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
WISEC
2010
ACM
13 years 5 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
14 years 23 days ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier
JLBS
2007
130views more  JLBS 2007»
13 years 7 months ago
Mobile positioning for traffic state acquisition
: The topics presented in this paper regard the project “Data Optimisation for integrated Telematics” (Do-iT) granted by the German ministry of economics and technology. Within...
Katrin Ramm, Volker Schwieger
CCS
2004
ACM
14 years 26 days ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...