Sciweavers

3395 search results - page 590 / 679
» Computational Differential Privacy
Sort
View
135
Voted
PERCOM
2004
ACM
16 years 3 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
126
Voted
MOBIHOC
2003
ACM
16 years 3 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
130
Voted
CHI
2010
ACM
15 years 10 months ago
Sharing conversation and sharing life: video conferencing in the home
Video conferencing is a technology that families and friends use to connect with each other over distance. However, even with such technology readily available, we still do not ha...
Tejinder K. Judge, Carman Neustaedter
HRI
2009
ACM
15 years 10 months ago
Robots in the wild: understanding long-term use
It has long been recognized that novelty effects exist in the interaction with technologies. Despite this recognition, we still know little about the novelty effects associated wi...
Ja-Young Sung, Henrik I. Christensen, Rebecca E. G...
OZCHI
2009
ACM
15 years 10 months ago
My phone is my keypad: privacy-enhanced PIN-entry on public terminals
More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations...
Alexander De Luca, Bernhard Frauendienst, Sebastia...