Sciweavers

ESORICS
2008
Springer
14 years 20 days ago
Location Privacy in Location-Based Services: Beyond TTP-based Schemes
Location-Based Services (LBS) are gaining importance due to the advances in mobile networks and positioning technologies. Nevertheless, the wide deployment of LBS can jeopardise th...
Agusti Solanas, Josep Domingo-Ferrer, Antoni Mart&...
EUC
2006
Springer
14 years 2 months ago
A Scalable and Untraceable Authentication Protocol for RFID
RFID(Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduce...
Youngjoon Seo, Hyunrok Lee, Kwangjo Kim
EDBT
2010
ACM
172views Database» more  EDBT 2010»
14 years 4 months ago
Privacy preserving group nearest neighbor queries
User privacy in location-based services has attracted great interest in the research community. We introduce a novel framework based on a decentralized architecture for privacy pr...
Tanzima Hashem, Lars Kulik, Rui Zhang
ITCC
2003
IEEE
14 years 4 months ago
A Federated Model for Secure Web-Based Videoconferencing
This paper describes efforts underway within Internet2 to create a secure federated IP based videoconferencing model. The objective is to create an environment that is user-friend...
Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, ...
WPES
2005
ACM
14 years 4 months ago
Determining user privacy preferences by asking the right questions: an automated approach
As the Internet becomes increasingly used for sensitive transactions, the need to protect user privacy becomes more and more important. One fundamental aspect of user privacy is t...
Keith Irwin, Ting Yu
WOWMOM
2005
ACM
86views Multimedia» more  WOWMOM 2005»
14 years 4 months ago
The Wireless Opaque Channel to Contrast Information Leakage
Widespread adoption of wireless devices has considerably enlarged the domain of user applications, but consequently specific issues related to a secure use of these devices arise...
Marco Domenico Aime, Andrea S. Atzeni, Antonio Lio...
ACSAC
2006
IEEE
14 years 5 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
ICDE
2007
IEEE
125views Database» more  ICDE 2007»
14 years 5 months ago
Privacy Protected Query Processing on Spatial Networks
With the proliferation of mobile devices (e.g., PDAs, cell phones, etc.), location-based services have become more and more popular in recent years. However, users have to reveal ...
Wei-Shinn Ku, Roger Zimmermann, Wen-Chih Peng, Sus...
PET
2009
Springer
14 years 5 months ago
RequestPolicy: Increasing Web Browsing Privacy through Control of Cross-Site Requests
Many requests that a Web browser makes are not made to the primary site a user is visiting. It is common for websites to instruct browsers to make additional requests to third-part...
Justin Samuel, Beichuan Zhang
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 8 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...