Sciweavers

381 search results - page 31 / 77
» Timing attacks on Web privacy
Sort
View
EWCBR
2008
Springer
13 years 9 months ago
Provenance, Trust, and Sharing in Peer-to-Peer Case-Based Web Search
Despite the success of modern Web search engines, challenges remain when it comes to providing people with access to the right information at the right time. In this paper, we desc...
Peter Briggs, Barry Smyth
PAM
2010
Springer
14 years 2 months ago
Web Timeouts and Their Implications
Abstract. Timeouts play a fundamental role in network protocols, controlling numerous aspects of host behavior at different layers of the protocol stack. Previous work has documen...
Zakaria Al-Qudah, Michael Rabinovich, Mark Allman
WS
2006
ACM
14 years 1 months ago
Location privacy in wireless personal area networks
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the p...
Dave Singelée, Bart Preneel
ICC
2009
IEEE
190views Communications» more  ICC 2009»
14 years 2 months ago
Protecting Location Privacy in Large-Scale Wireless Sensor Networks
—In a wireless sensor network, an adversary equipped monitoring antenna can easily overhear packets, which may facilitate identifying the directions of packet flows and trace to ...
Lei Kang
TKDE
2012
227views Formal Methods» more  TKDE 2012»
11 years 10 months ago
Publishing Search Logs - A Comparative Study of Privacy Guarantees
—Search engine companies collect the “database of intentions”, the histories of their users’ search queries. These search logs are a gold mine for researchers. Search engin...
Michaela Götz, Ashwin Machanavajjhala, Guozha...