Sciweavers

114 search results - page 2 / 23
» On the Privacy of Concealed Data Aggregation
Sort
View
INFOCOM
2007
IEEE
13 years 11 months ago
PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks
Abstract— Providing efficient data aggregation while preserving data privacy is a challenging problem in wireless sensor networks research. In this paper, we present two privacy...
Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt, ...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
13 years 11 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
PET
2012
Springer
11 years 7 months ago
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
We consider applications scenarios where an untrusted aggregator wishes to continually monitor the heavy-hitters across a set of distributed streams. Since each stream can contain ...
T.-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchan...
INFOCOM
2010
IEEE
13 years 3 months ago
PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems
People-centric urban sensing is a new paradigm gaining popularity. A main obstacle to its widespread deployment and adoption are the privacy concerns of participating individuals. ...
Jing Shi, Rui Zhang, Yunzhong Liu, Yanchao Zhang
MIDDLEWARE
2010
Springer
13 years 3 months ago
Anonygator: Privacy and Integrity Preserving Data Aggregation
Abstract. Data aggregation is a key aspect of many distributed applications, such as distributed sensing, performance monitoring, and distributed diagnostics. In such settings, use...
Krishna P. N. Puttaswamy, Ranjita Bhagwan, Venkata...