Sciweavers

675 search results - page 93 / 135
» Anonymous communication in overlay networks
Sort
View
SRDS
2005
IEEE
14 years 4 months ago
Distributed Construction of a Fault-Tolerant Network from a Tree
We present an algorithm by which nodes arranged in a tree, with each node initially knowing only its parent and children, can construct a fault-tolerant communication structure (a...
Michael K. Reiter, Asad Samar, Chenxi Wang
GIS
2008
ACM
15 years 1 days ago
Privacy: preserving trajectory collection
In order to provide context?aware Location?Based Services, real location data of mobile users must be collected and analyzed by spatio?temporal data mining methods. However, the d...
Gyözö Gidófalvi, Torben Bach Pede...
CTRSA
2004
Springer
89views Cryptology» more  CTRSA 2004»
14 years 4 months ago
Universal Re-encryption for Mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
Philippe Golle, Markus Jakobsson, Ari Juels, Paul ...
CSCW
2012
ACM
12 years 6 months ago
Towards self-optimizing collaborative systems
Two important performance metrics in collaborative systems are local and remote response times. Previous analytical and simulation work has shown that these response times depend ...
Sasa Junuzovic, Prasun Dewan
MOBISYS
2008
ACM
14 years 10 months ago
Anonysense: privacy-aware people-centric sensing
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network w...
Cory Cornelius, Apu Kapadia, David Kotz, Daniel Pe...