Sciweavers

18 search results - page 4 / 4
» ECPP: Efficient Conditional Privacy Preservation Protocol fo...
Sort
View
CCS
2008
ACM
13 years 8 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
14 years 6 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
14 years 1 days ago
SIKAS: A Scalable Distributed Key Management Scheme for Dynamic Collaborative Groups
The increasing popularity of distributed and collaborative applications prompts the need for secure communication in collaborative groups. Some distributed collaborative key manag...
Jiang Zhang, Jian-Guang Luo, Bin Li, Shiqiang Yang