Sciweavers

402 search results - page 43 / 81
» Achieving privacy in mesh networks
Sort
View
CSCW
2006
ACM
14 years 2 months ago
A grounded theory of information sharing behavior in a personal learning space
This paper presents a grounded theory of information sharing behavior of the users of a personal learning space. A personal learning space is an environment consisted of weblog, e...
Maryam Najafian Razavi, Lee Iverson
WCNC
2010
IEEE
14 years 26 days ago
V-Tokens for Conditional Pseudonymity in VANETs
—Privacy is an important requirement in vehicle networks, because vehicles broadcast detailed location information. Also of importance is accountability due to safety critical ap...
Florian Schaub, Frank Kargl, Zhendong Ma, Michael ...
AGENTS
1997
Springer
14 years 1 months ago
Ant-Like Agents for Load Balancing in Telecommunications Networks
This paper describes a novel method of achieving load balancing in telecommunications networks. A simulated network models a typical distribution of calls between arbitrary nodes;...
Ruud Schoonderwoerd, Owen Holland, Janet Bruten
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
13 years 6 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
CONEXT
2008
ACM
13 years 10 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...