Sciweavers

130 search results - page 21 / 26
» Location Privacy Protection Through Obfuscation-Based Techni...
Sort
View
CSCW
2004
ACM
13 years 7 months ago
People-to-People-to-Geographical-Places: The P3 Framework for Location-Based Community Systems
Abstract. In this paper we examine an emerging class of systems that link People-to-People-toGeographical-Places; we call these P3-Systems. Through analyzing the literature, we hav...
Quentin Jones, Sukeshini A. Grandhi, Loren G. Terv...
CN
2010
103views more  CN 2010»
13 years 7 months ago
Anti-localization anonymous routing for Delay Tolerant Network
This paper focuses on the problem of how to allow a source to send a message without revealing its physical location and proposes an anti-localization routing protocol, ALAR, to a...
Xiaofeng Lu, Pan Hui, Don Towsley, Juahua Pu, Zhan...
USS
2008
13 years 10 months ago
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software
Remote error analysis aims at timely detection and remedy of software vulnerabilities through analyzing runtime errors that occur on the client. This objective can only be achieve...
Rui Wang 0010, XiaoFeng Wang, Zhuowei Li
ACSAC
2010
IEEE
13 years 5 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang
SOUPS
2009
ACM
14 years 2 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov