Sciweavers

358 search results - page 31 / 72
» Preserving Privacy in Awareness Systems
Sort
View
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
13 years 3 days ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
67
Voted
CIDR
2007
79views Algorithms» more  CIDR 2007»
14 years 11 months ago
Beyond Just Data Privacy
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...
Bob Mungamuru, Hector Garcia-Molina
IEEEARES
2010
IEEE
15 years 3 months ago
Architecture-Aware Adaptive Deployment of Contextual Security Policies
—Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accura...
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
P2P
2010
IEEE
132views Communications» more  P2P 2010»
14 years 8 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...
Yanbin Lu, Gene Tsudik
ICMCS
2006
IEEE
191views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Human Vision System Aware Exhaustive Block-Matching Algorithm
In this work, homomorphic image modeling is used to make the exhaustive block-matching algorithm (EBMA) more human vision system (HVS) aware, thus yielding visually pleasing seque...
David Lin, Paul Chau