Sciweavers

3395 search results - page 113 / 679
» Computational Differential Privacy
Sort
View
91
Voted
WISEC
2010
ACM
15 years 5 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
74
Voted
HUC
2009
Springer
15 years 2 months ago
A spotlight on security and privacy risks with future household robots: attacks and lessons
Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household r...
Tamara Denning, Cynthia Matuszek, Karl Koscher, Jo...
86
Voted
ACSC
2008
IEEE
15 years 4 months ago
Privacy preserving set intersection based on bilinear groups
We propose a more efficient privacy preserving set intersection protocol which improves the previously known result by a factor of O(N) in both the computation and communication c...
Yingpeng Sang, Hong Shen
WCNC
2008
IEEE
15 years 4 months ago
Loss Differentiated Rate Adaptation in Wireless Networks
Data rate adaptation is the process to select the optimal data rates for instantaneous channel conditions. This paper proposes a data rate adaptation technique that poses followin...
Saad Biaz, Shaoen Wu
BROADNETS
2005
IEEE
15 years 3 months ago
A rate adaptation algorithm for ieee 802.11 wlans based on Mac-Layer Loss Differentiation
— In a WLAN subject to variable wireless channel conditions, rate adaptation plays an important role to more efficiently utilize the physical link. However, the existing rate ada...
Qixiang Pang, Victor C. M. Leung, Soung Chang Liew