Sciweavers

125 search results - page 19 / 25
» Non-Exposure Location Anonymity
Sort
View
STACS
2001
Springer
14 years 2 months ago
Gathering of Asynchronous Oblivious Robots with Limited Visibility
Abstract. We consider a collection of robots which are identical (anonymous), have limited visibility of the environment, and no memory of the past (oblivious); furthermore, they a...
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro...
ALGOSENSORS
2007
Springer
14 years 4 months ago
Asynchronous Training in Wireless Sensor Networks
Scalable energy-efficient training protocols are proposed for massively-deployed sensor networks, where sensors are initially anonymous and unaware of their location. The protocol...
Ferruccio Barsi, Alan A. Bertossi, Francesco Betti...
USS
2008
14 years 11 days ago
The Case for Networked Remote Voting Precincts
Voting in national elections from the comfort of one's home computer may never be practical or secure, but we argue that remote network voting can be both practical and secur...
Daniel Sandler, Dan S. Wallach
MDM
2007
Springer
106views Communications» more  MDM 2007»
14 years 4 months ago
Protecting Moving Trajectories with Dummies
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 4 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz