Sciweavers

2454 search results - page 48 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ESORICS
2006
Springer
15 years 1 months ago
Private Information Retrieval Using Trusted Hardware
Abstract. Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impract...
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
PERCOM
2005
ACM
15 years 9 months ago
A Privacy Enhanced Service Architecture for Mobile Users
Location, presence and messaging services provide the essential ingredients for emerging information and communications services. Nevertheless, the users are concerned about revea...
Sandford Bessler, Oliver Jorns
ICDCSW
2005
IEEE
15 years 3 months ago
Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy
Due to the utilization of location information, geographic ad hoc routing presents superiority in scalability compared with traditional topology-based routing in mobile ad hoc net...
Zhou Zhi, Yow Kin Choong
TMC
2012
13 years 5 days ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
86
Voted
HICSS
2008
IEEE
155views Biometrics» more  HICSS 2008»
15 years 4 months ago
Pseudonymization for improving the Privacy in E-Health Applications
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...