Sciweavers

402 search results - page 45 / 81
» Achieving privacy in mesh networks
Sort
View
ICNP
2009
IEEE
14 years 3 months ago
Topology Control Protocol Using Sectorized Antennas in Dense 802.11 Wireless Networks
—We introduce a measurement-based optimization framework for topology control in dense 802.11 networks using sectorized antennas. We first formulate a topology control optimizat...
Anand Prabhu Subramanian, Henrik Lundgren, Theodor...
EDBT
2010
ACM
180views Database» more  EDBT 2010»
14 years 1 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...
WIOPT
2005
IEEE
14 years 2 months ago
Secure Comparison of Encrypted Data in Wireless Sensor Networks
End-to-end encryption schemes that support operations over ciphertext are of utmost importance for commercial private party Wireless Sensor Network implementations to become meani...
Mithun Acharya, Joao Girão, Dirk Westhoff
ANCS
2007
ACM
14 years 1 months ago
Frame-aggregated concurrent matching switch
Network operators need high-capacity router architectures that can offer scalability, provide throughput and performance guarantees, and maintain packet ordering. However, previou...
Bill Lin, Isaac Keslassy
EUROPKI
2006
Springer
14 years 19 days ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng