Sciweavers

661 search results - page 8 / 133
» Robustness Guarantees for Anonymity
Sort
View
TDSC
2011
13 years 2 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
ICDE
2010
IEEE
359views Database» more  ICDE 2010»
14 years 7 months ago
Policy-Aware Sender Anonymity in Location Based Services
Sender anonymity in location-based services (LBS) attempts to hide the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. &...
Alin Deutsch, Richard Hull, Avinash Vyas, Kevin Ke...
IEEEARES
2007
IEEE
14 years 1 months ago
A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network
We propose a practical verifiable e-voting protocol which guarantees e-voting requirements: privacy, eligibility, uniqueness, uncoercibility, fairness, accuracy, robustness, indiv...
Orhan Cetinkaya, Ali Doganaksoy
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
13 years 5 months ago
Probabilistic Inference Protection on Anonymized Data
Background knowledge is an important factor in privacy preserving data publishing. Probabilistic distributionbased background knowledge is a powerful kind of background knowledge w...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Y...
JHSN
2002
80views more  JHSN 2002»
13 years 7 months ago
A network architecture for providing per-flow delay guarantees with scalable core
Abstract. Many real-time applications demand delay guarantees from the network. A network architecture designed to support these applications should be robust and scalable. The Int...
Prasanna Chaporkar, Joy Kuri