Sciweavers

6137 search results - page 978 / 1228
» Securing Collaborative Applications
Sort
View
CCS
2011
ACM
14 years 2 months ago
Forensic investigation of the OneSwarm anonymous filesharing system
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
Swagatika Prusty, Brian Neil Levine, Marc Liberato...
CCS
2011
ACM
14 years 2 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
MOBIHOC
2012
ACM
13 years 4 months ago
Enforcing dynamic spectrum access with spectrum permits
Dynamic spectrum access is a maturing technology that allows next generation wireless devices to make highly efficient use of wireless spectrum. Spectrum can be allocated on an o...
Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher ...
ICDE
2009
IEEE
154views Database» more  ICDE 2009»
16 years 4 months ago
A General Proximity Privacy Principle
Recent years have witnessed ever-increasing concerns about individual privacy in numerous data dissemination applications that involve private personal information, e.g., medical...
Ting Wang, Shicong Meng, Bhuvan Bamba, Ling Liu, C...
ICDE
2004
IEEE
124views Database» more  ICDE 2004»
16 years 3 months ago
Authenticating Query Results in Edge Computing
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not nec...
HweeHwa Pang, Kian-Lee Tan