Sciweavers

1040 search results - page 39 / 208
» Privacy for Telecom Services
Sort
View
PRDC
2007
IEEE
14 years 3 months ago
Implementation of Highly Available OSPF Router on ATCA
This paper proposes a Highly-Available Open Shortest Path First (HA-OSPF) router which consists of two OSPF router modules-active and standby-to support a highavailability network...
Chia-Tai Tsai, Rong-Hong Jan, Chien Chen, Chia-Yua...
TMC
2011
1105views more  TMC 2011»
13 years 4 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
SRDS
2010
IEEE
13 years 7 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
JCP
2006
118views more  JCP 2006»
13 years 9 months ago
A Method of An Anonymous Authentication For Flat-rate Service
As the ubiquitous society spreads rapidly, various private information circulates in large quantities. Information increases explosively in recent years, the importance of privacy ...
Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
14 years 9 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...