—Anonymous communication protocols must achieve two seemingly contradictory goals: privacy (informally, they must guarantee the anonymity of the parties that send/receive informa...
Mobile phones have become a ubiquitous technology and for many people a daily companion, primarily used for communication and information access. The fact that the phone is accomp...
In this paper, we describe a secure group communication protocol for a fault-tolerant synchronous ring. Our protocol, named Secure Synchronous Ring Protocol (SSRP), integrates a se...
Despite the increasing maturity of model-driven development (MDD), some research challenges remain open in the field of information systems (IS). For instance, there is a need to i...
In this paper we study the privacy preservation properties of a specific technique for query log anonymization: tokenbased hashing. In this approach, each query is tokenized, and ...
Ravi Kumar, Jasmine Novak, Bo Pang, Andrew Tomkins