Sciweavers

130 search results - page 16 / 26
» Location Privacy Protection Through Obfuscation-Based Techni...
Sort
View
CCS
2003
ACM
14 years 26 days ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
EUC
2008
Springer
13 years 9 months ago
Analyzing Privacy Designs of Mobile Social Networking Applications
The combined advances of open mobile platforms and online social networking applications (SNAs) are driving pervasive computing to the real-world users, as the mobile SNAs are exp...
Guanling Chen, Faruq Rahman
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
14 years 8 months ago
Workload-aware anonymization
Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
MOBISYS
2004
ACM
14 years 7 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay
NDSS
2007
IEEE
14 years 1 months ago
Cryptographic Methods for Storing Ballots on a Voting Machine
A direct recording electronic (DRE) voting machine must satisfy several requirements to ensure voter privacy and the integrity of the election. A recent proposal for a vote storag...
John Bethencourt, Dan Boneh, Brent Waters