Sciweavers

49 search results - page 9 / 10
» Pseudonym Systems
Sort
View
CNSR
2007
IEEE
124views Communications» more  CNSR 2007»
14 years 1 months ago
Evaluation Framework of Location Privacy of Wireless Mobile Systems with Arbitrary Beam Pattern
Position localization of transmitters can be carried out by an adversary owning a network of pervasive receivers, which can pinpoint the victim mobile nodes’ locations with high...
Ford-Long Wong, Min Lin, Shishir Nagaraja, Ian J. ...
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
14 years 22 days ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
CCS
2009
ACM
14 years 2 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
CSCW
2012
ACM
12 years 3 months ago
Boundary regulation in social media
The management of group context in socially mediating technologies is an important challenge for the design community. To better understand how users manage group context, we expl...
Stutzman Frederic, Hartzog Woodrow
NDSS
2007
IEEE
14 years 1 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith