Sciweavers

391 search results - page 28 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
PERCOM
2010
ACM
13 years 5 months ago
Integrating people-centric sensing with social networks: A privacy research agenda
During the last few years there has been an increasing number of people-centric sensing projects, which combine location information with other sensors available on mobile devices,...
Ioannis Krontiris, Felix C. Freiling
CCS
2009
ACM
14 years 2 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
IEEECIT
2006
IEEE
14 years 1 months ago
Extending Pervasive Devices with the Semantic Grid: A Service Infrastructure Approach
Pervasive computing devices are gradually becoming increasingly prevalent in our everyday life, enabling the users in the physical world to interact with the digital world. Grid c...
Tao Guan, Ed Zaluska, David De Roure
CORR
2011
Springer
195views Education» more  CORR 2011»
13 years 2 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
ESORICS
2009
Springer
14 years 2 months ago
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services
Abstract. The ubiquity of smartphones and other location-aware handheld devices has resulted in a dramatic increase in popularity of locationbased services (LBS) tailored to user l...
Ali Khoshgozaran, Cyrus Shahabi