Sciweavers

2454 search results - page 130 / 491
» Privacy in the Information and Communications Technologies
Sort
View
79
Voted
CSFW
2010
IEEE
15 years 5 months ago
Robustness Guarantees for Anonymity
—Anonymous communication protocols must achieve two seemingly contradictory goals: privacy (informally, they must guarantee the anonymity of the parties that send/receive informa...
Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tama...
CHI
2006
ACM
16 years 1 months ago
Utilizing mobile phones as ambient information displays
Mobile phones have become a ubiquitous technology and for many people a daily companion, primarily used for communication and information access. The fact that the phone is accomp...
Albrecht Schmidt, Jonna Häkkilä, Richard...
ISCIS
2003
Springer
15 years 6 months ago
Design and Implementation of a Secure Group Communication Protocol on a Fault Tolerant Ring
In this paper, we describe a secure group communication protocol for a fault-tolerant synchronous ring. Our protocol, named Secure Synchronous Ring Protocol (SSRP), integrates a se...
Özgür Saglam, Mehmet E. Dalkilç, ...
CORR
2011
Springer
227views Education» more  CORR 2011»
14 years 8 months ago
Message Structures: a modelling technique for information systems analysis and design
Despite the increasing maturity of model-driven development (MDD), some research challenges remain open in the field of information systems (IS). For instance, there is a need to i...
Sergio España, Arturo González, Osca...
WWW
2007
ACM
16 years 2 months ago
On anonymizing query logs via token-based hashing
In this paper we study the privacy preservation properties of a specific technique for query log anonymization: tokenbased hashing. In this approach, each query is tokenized, and ...
Ravi Kumar, Jasmine Novak, Bo Pang, Andrew Tomkins