Sciweavers

1551 search results - page 11 / 156
» Privacy-Preserving Network Aggregation
Sort
View
218 views 150 votes 16 years 2 months ago  PERCOM 2007»
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
190 views 142 votes 16 years 2 months ago  PERCOM 2005»
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
204 views 136 votes 15 years 9 months ago  NDSS 2009»
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
165 views 121 votes 15 years 9 months ago  INFOCOM 2009»
—With in-network sensor data storage and query, storage nodes are responsible for storing the data collected by sensor nodes and answering queries from users. Thus, without prope...
102 views 110 votes 15 years 9 months ago  POLICY 2007»
The process of policy reconciliation allows multiple parties with possibly different policies to resolve differences in order to reach an agreement on an acceptable policy. Previo...
298 views 119 votes 15 years 24 days ago  ICIP 2010»
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
239 views 134 votes 14 years 6 months ago  INFOCOM 2011»
—Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver’s location information ma...
284 views 129 votes 15 years 12 months ago  EWSN 2010»
The proliferation of sensors in devices of frequent use, such as mobile phones, offers unprecedented opportunities for forming selfselected communities around shared sensory data ...
149 views 125 votes 15 years 2 months ago  JUCS 2008»
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
118 views 129 votes 15 years 9 months ago  BPM 2007»
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...