Sciweavers

16 search results - page 2 / 4
» Preventing Active Timing Attacks in Low-Latency Anonymous Co...
Sort
View
CCS
2005
ACM
14 years 3 months ago
Tracking anonymous peer-to-peer VoIP calls on the internet
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low lat...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
WISA
2004
Springer
14 years 3 months ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against trafď...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
14 years 4 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
WISEC
2010
ACM
13 years 7 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
SIES
2009
IEEE
14 years 4 months ago
A wireless body sensor network for the prevention and management of asthma
—We present an application of an open source platform for wireless body sensor network called DexterNet to the problem of children’s asthma. The architecture of the system cons...
Edmund Y. W. Seto, Annarita Giani, Victor Shia, Cu...