Sciweavers

391 search results - page 22 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
GI
2009
Springer
14 years 4 days ago
Flow-driven Interactions for Adaptive Pervasive Applications
: The era of ubiquitous and pervasive computing technology opens the world for new pervasive applications and services within the physical surroundings. Often users find themselves...
Bashar Altakrouri
CRITICAL
2005
13 years 9 months ago
Involving non-players in pervasive games
In traditional computer games, it is not uncommon for the game world to be inhabited by numerous computergenerated characters, Non-Player Characters (NPCs). In pervasive games, pl...
Jenny Niemi, Susanna Sawano, Annika Waern
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
14 years 7 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
SP
2003
IEEE
155views Security Privacy» more  SP 2003»
14 years 24 days ago
Mixminion: Design of a Type III Anonymous Remailer Protocol
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
George Danezis, Roger Dingledine, Nick Mathewson
SAINT
2005
IEEE
14 years 1 months ago
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture ...
Antonio Corradi, Rebecca Montanari, Daniela Tibald...