Sciweavers

2454 search results - page 79 / 491
» Privacy in the Information and Communications Technologies
Sort
View
TMC
2008
159views more  TMC 2008»
14 years 12 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
ACISICIS
2008
IEEE
15 years 8 months ago
SIMPA: A SIP-Based Mobile Payment Architecture
In recent years, many Mobile Payment (MP) schemes have been proposed and used in practise. However, a prerequisite for extended acceptance and adoption of MP technologies is to de...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
IEEESCC
2007
IEEE
15 years 7 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
ICMI
2007
Springer
129views Biometrics» more  ICMI 2007»
15 years 7 months ago
Towards smart meeting: enabling technologies and a real-world application
In this paper, we describe the enabling technologies to develop a smart meeting system based on a three layered generic model. From physical level to semantic level, it consists o...
Zhiwen Yu, Motoyuki Ozeki, Yohsuke Fujii, Yuichi N...
CCS
2010
ACM
15 years 1 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov