Sciweavers

211 search results - page 28 / 43
» Privacy Protected Query Processing on Spatial Networks
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments
In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services becomes perv...
Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni
GIS
2010
ACM
13 years 7 months ago
Towards location-based social networking services
Social networking applications have become very important web services that provide Internet-based platforms for their users to interact with their friends. With the advances in t...
Chi-Yin Chow, Jie Bao 0003, Mohamed F. Mokbel
SACMAT
2009
ACM
14 years 3 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...
CODASPY
2012
12 years 4 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
CCS
2009
ACM
14 years 9 months ago
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cas...
Hai Huang, Zhenfu Cao