Sciweavers

125 search results - page 18 / 25
» Non-Exposure Location Anonymity
Sort
View
PERCOM
2005
ACM
14 years 9 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...
CSE
2009
IEEE
14 years 4 months ago
Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans
—Modern consumer wireless devices are increasingly powerful, making them attractive to use as wireless sensor nodes. At the same time, many use protocol suites such as Bluetooth ...
David Evans, Robert H. Warren
PERVASIVE
2005
Springer
14 years 3 months ago
Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors
Abstract. In this paper we introduce the simultaneous tracking and activity recognition (STAR) problem, which exploits the synergy between location and activity to provide the info...
D. H. Wilson, Christopher G. Atkeson
ESORICS
2009
Springer
14 years 4 months ago
Privacy Preserving Publication of Moving Object Data
The increasing availability of space-time trajectories left by location-aware devices is expected to enable novel classes of applications where the discovery of consumable, concise...
Francesco Bonchi

Publication
243views
15 years 9 months ago
Enabling Private Continuous Queries For Revealed User Locations
Existing location-based services provide specialized services to their customers based on the knowledge of their exact locations. With untrustworthy servers, location-based service...
Chi-Yin Chow, Mohamed F. Mokbel