Sciweavers

1599 search results - page 180 / 320
» Probabilistic Analysis of Anonymity
Sort
View
MDM
2010
Springer
301views Communications» more  MDM 2010»
15 years 8 months ago
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services
Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
PODC
2010
ACM
15 years 7 months ago
Distributed algorithms for edge dominating sets
An edge dominating set for a graph G is a set D of edges such that each edge of G is in D or adjacent to at least one edge in D. This work studies deterministic distributed approx...
Jukka Suomela
FC
2008
Springer
82views Cryptology» more  FC 2008»
15 years 5 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
BCSHCI
2007
15 years 5 months ago
Bluetooth friendly names: bringing classic HCI questions into the mobile space
We explore the use of Bluetooth friendly names within the mobile space. Each Bluetooth-enabled device possesses a short string known as a ‘friendly name’ used to help identify...
Barry Lavelle, Daragh Byrne, Gareth J. F. Jones, A...
USENIX
2000
15 years 5 months ago
The Globe Distribution Network
The goal of the Globe project is to design and build a middleware platform that facilitates the development of large-scale distributed applications, such as those found on the Int...
Arno Bakker, E. Amade, Gerco Ballintijn, Ihor Kuz,...