Sciweavers

770 search results - page 89 / 154
» Privacy Preserving Joins
Sort
View
PPNA
2011
14 years 2 months ago
Ad-hoc limited scale-free models for unstructured peer-to-peer networks
Several protocol efficiency metrics (e.g., scalability, search success rate, routing reachability and stability) depend on the capability of preserving structure even over the ch...
Durgesh Rani Kumari, Hasan Guclu, Murat Yuksel
MDAI
2005
Springer
15 years 5 months ago
Cryptosystems Based on Elliptic Curve Pairing
The purpose of this paper is to introduce pairing over elliptic curve and apply it to ID based key agreement schemes and privacy preserving key agreement schemes. The key words her...
Eiji Okamoto, Takeshi Okamoto
MDM
2010
Springer
301views Communications» more  MDM 2010»
15 years 4 months ago
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services
Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
CORR
2010
Springer
90views Education» more  CORR 2010»
14 years 12 months ago
Two-Domain DNA Strand Displacement
We investigate the computing power of a restricted class of DNA strand displacement structures: those that are made of double strands with nicks (interruptions) in the top strand....
Luca Cardelli
P2P
2010
IEEE
132views Communications» more  P2P 2010»
14 years 10 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers ...
Yanbin Lu, Gene Tsudik