Sciweavers

1351 search results - page 66 / 271
» Trust in Anonymity Networks
Sort
View
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 6 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
14 years 9 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta
MIDDLEWARE
2010
Springer
13 years 7 months ago
The Gossple Anonymous Social Network
While social networks provide news from old buddies, you can learn a lot more from people you do not know, but with whom you share many interests. We show in this paper how to bui...
Marin Bertier, Davide Frey, Rachid Guerraoui, Anne...
GLOBECOM
2007
IEEE
14 years 3 months ago
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks
— Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing ...
Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle, Hei...
WPES
2003
ACM
14 years 2 months ago
Covert channels and anonymizing networks
There have long been threads of investigation into covert channels, and threads of investigation into anonymity, but these two closely related areas of information hiding have not...
Ira S. Moskowitz, Richard E. Newman, Daniel P. Cre...