Sciweavers

1064 search results - page 56 / 213
» Cryptography from Anonymity
Sort
View
DEXA
2008
Springer
87views Database» more  DEXA 2008»
13 years 11 months ago
Tracking Moving Objects in Anonymized Trajectories
Multiple target tracking (MTT) is a well-studied technique in the field of radar technology, which associates anonymized measurements with the appropriate object trajectories. This...
Nikolay Vyahhi, Spiridon Bakiras, Panos Kalnis, Ga...
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
13 years 7 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
TMA
2012
Springer
254views Management» more  TMA 2012»
12 years 5 months ago
Steps towards the Extraction of Vehicular Mobility Patterns from 3G Signaling Data
Abstract. The signaling traffic of a cellular network is rich of information related to the movements of its devices across cell boundaries. Thus, passive monitoring of anonymized ...
Pierdomenico Fiadino, Danilo Valerio, Fabio Riccia...
CTRSA
2005
Springer
221views Cryptology» more  CTRSA 2005»
14 years 3 months ago
Accumulators from Bilinear Pairings and Applications
We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constru...
Lan Nguyen
PERVASIVE
2011
Springer
13 years 14 days ago
Identifying Important Places in People's Lives from Cellular Network Data
People spend most of their time at a few key locations, such as home and work. Being able to identify how the movements of people cluster around these “important places” is cru...
Sibren Isaacman, Richard Becker, Ramón C&aa...