Sciweavers

212 search results - page 13 / 43
» Anonymity and k-Choice Identities
Sort
View
ICRA
2010
IEEE
112views Robotics» more  ICRA 2010»
13 years 6 months ago
On the solvability of the Mutual Localization problem with Anonymous Position Measures
— This paper formulates and investigates a novel problem called Mutual Localization with Anonymous Position Measures. This is an extension of Mutual Localization with Position Me...
Antonio Franchi, Giuseppe Oriolo, Paolo Stegagno
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
11 years 10 months ago
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Abstract. In the standard setting of broadcast encryption, information about the receivers is transmitted as part of the ciphertext. In several broadcast scenarios, however, the id...
Nelly Fazio, Irippuge Milinda Perera
COCOA
2008
Springer
13 years 9 months ago
Fixed-Parameter Tractability of Anonymizing Data by Suppressing Entries
A popular model for protecting privacy when person-specific data is released is k-anonymity. A dataset is k-anonymous if each record is identical to at least (k - 1) other records ...
Rhonda Chaytor, Patricia A. Evans, Todd Wareham
JCP
2006
118views more  JCP 2006»
13 years 7 months ago
A Method of An Anonymous Authentication For Flat-rate Service
As the ubiquitous society spreads rapidly, various private information circulates in large quantities. Information increases explosively in recent years, the importance of privacy ...
Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji
MOBICOM
2010
ACM
13 years 7 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...