A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
In the last years several attempts to define identity-related properties such as identifiability, pseudonymity and anonymity have been made to analyze the privacy offered by inform...
In this paper we develop a language of mobile agents called uPLAN for describing the capabilities of active (programmable) networks. We use a formal semantics for uPLAN to demonst...
Collaboration among organizations or individuals is common. While these participants are often unwilling to share all their information with each other, some information sharing i...
—Recent advances in mobile handheld devices have facilitated the ubiquitous availability of location based services. Systems which provide location based services have always bee...