An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
The telecommunications environment is changing its face towards an open market of information services where the vision is "information any time, at any place, in any form&qu...
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
This paper presents a software framework, called Collaborator, to provide a shared work-space supporting the activities of virtual teams. This system exploits seamless integration ...