Sciweavers

518 search results - page 53 / 104
» Abstract Interpretation-Based Protection
Sort
View
121
Voted
COSIT
2005
Springer
95views GIS» more  COSIT 2005»
15 years 8 months ago
Simulation of Obfuscation and Negotiation for Location Privacy
Abstract. Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because c...
Matt Duckham, Lars Kulik
ESORICS
2005
Springer
15 years 8 months ago
On Scalability and Modularisation in the Modelling of Network Security Systems
Abstract. As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of ...
João Porto de Albuquerque, Heiko Krumm, Pau...
ISW
2005
Springer
15 years 8 months ago
A Privacy Preserving Rental System
Abstract. Rental records contain much sensitive information on individuals, so if abused by the rental service providers, user privacy could be jeopardized. To mitigate this concer...
Yanjiang Yang, Beng Chin Ooi
113
Voted
KES
2005
Springer
15 years 8 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang
100
Voted
PERVASIVE
2005
Springer
15 years 8 months ago
Tracking Locations of Moving Hand-Held Displays Using Projected Light
Abstract. Researchers have recently demonstrated display positioning using optical sensors in conjunction with temporally-coded patterns of projected light. This paper extends that...
Jay Summet, Rahul Sukthankar