Sciweavers

3299 search results - page 166 / 660
» Privacy and Trusted Computing
Sort
View
P2P
2003
IEEE
101views Communications» more  P2P 2003»
15 years 10 months ago
Trust and Reputation Model in Peer-to-Peer Networks
Yao Wang, Julita Vassileva
PODS
2012
ACM
244views Database» more  PODS 2012»
13 years 7 months ago
A rigorous and customizable framework for privacy
In this paper we introduce a new and general privacy framework called Pufferfish. The Pufferfish framework can be used to create new privacy definitions that are customized t...
Daniel Kifer, Ashwin Machanavajjhala
CVPR
2008
IEEE
16 years 7 months ago
Privacy preserving crowd monitoring: Counting people without people models or tracking
Antoni B. Chan, Zhang-Sheng John Liang, Nuno Vasco...
143
Voted
COSIT
2005
Springer
95views GIS» more  COSIT 2005»
15 years 10 months ago
Simulation of Obfuscation and Negotiation for Location Privacy
Abstract. Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because c...
Matt Duckham, Lars Kulik
104
Voted
CHI
2003
ACM
16 years 5 months ago
Usability and privacy: a study of Kazaa P2P file-sharing
Nathaniel Good, Aaron Krekelberg