Sciweavers

118 search results - page 19 / 24
» Privacy Preservation over Untrusted Mobile Networks
Sort
View
EUROPKI
2004
Springer
15 years 2 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
SIGCOMM
2009
ACM
15 years 4 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
CCGRID
2011
IEEE
14 years 1 months ago
GeoServ: A Distributed Urban Sensing Platform
—Urban sensing where mobile users continuously gather, process, and share location-sensitive sensor data (e.g., street images, road condition, traffic flow) is emerging as a ne...
Jong Hoon Ahnn, Uichin Lee, Hyun Jin Moon
CCS
2005
ACM
15 years 3 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
81
Voted
WISEC
2010
ACM
14 years 7 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed