Sciweavers

24 search results - page 5 / 5
» A Distributed k-Anonymity Protocol for Location Privacy
Sort
View
ACSAC
2004
IEEE
13 years 8 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu
SOCIALCOM
2010
13 years 2 months ago
GDC: Group Discovery Using Co-location Traces
Smart phones can collect and share Bluetooth co-location traces to identify ad hoc or semi-permanent social groups. This information, known to group members but otherwise unavailab...
Steve Mardenfeld, Daniel Boston, Susan Juan Pan, Q...
EXPERT
2006
107views more  EXPERT 2006»
13 years 4 months ago
Provenance in Agent-Mediated Healthcare Systems
Agent-oriented cooperation techniques and standardized electronic healthcare record exchange protocols can be used to combine information regarding different facets of a therapy re...
Tamás Kifor, László Zsolt Var...
ICSE
2008
IEEE-ACM
14 years 4 months ago
The international workshop on software architectures and mobility (SAM 2008)
E-businesses are increasingly facing the need of porting the provision of their e-services to mobile customers. Evolving requirements, such as reliability, security, scalability, ...
Licia Capra, Rami Bahsoon, Wolfgang Emmerich, Moha...