We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-...
Abstract. Safety systems for railways have shifted from electronic relays to more computer-oriented approaches. This article highlights the language EURIS from NS Railinfrabeheer, ...
Fokko van Dijk, Wan Fokkink, Gea Kolk, Paul van de...
We present techniques for privacy-preserving computation of multidimensional aggregates on data partitioned across multiple clients. Data from different clients is perturbed (rand...
Rakesh Agrawal, Ramakrishnan Srikant, Dilys Thomas
Proximity based services are location based services (LBS) in which the service adaptation depends on the comparison between a given threshold value and the distance between a use...
This paper examines how service providers may resolve the trade-off between their personalization efforts and users' individual privacy concerns. We analyze how negotiation te...