Sciweavers

345 search results - page 38 / 69
» Providing K-Anonymity in location based services
Sort
View
HUC
2007
Springer
14 years 2 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
NOMS
2010
IEEE
195views Communications» more  NOMS 2010»
13 years 6 months ago
Optimized network configuration parameter assignment based on graph coloring
The trend for future mobile networks is to move away from Network Elements (NEs) delivered with specially tailored configurations towards off-the-shelf products. The configurations...
Tobias Bandh, Georg Carle, Henning Sanneck, Lars-C...
SDMW
2009
Springer
14 years 1 months ago
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity
A “friend finder” is a Location Based Service (LBS) that informs users about the presence of participants in a geographical area. In particular, one of the functionalities of ...
Sergio Mascetti, Claudio Bettini, Dario Freni
KIVS
2005
Springer
14 years 2 months ago
A Peer-to-Peer Webcam Network
: Today, most peer-to-peer networks are specialised for sharing files, mostly video and audio files. In this paper we describe a peer-to-peer network we are currently implementin...
Nicolas Liebau, Oliver Heckmann, Ian Hubbertz, Ral...
MHCI
2004
Springer
14 years 1 months ago
Interactive Positioning Based on Object Visibility
Abstract. In this paper we describe a new method and user interface for interactive positioning of a mobile device. The key element of this method is a questionanswer style dialogu...
Christian Kray, Gerd Kortuem