Sciweavers

1551 search results - page 12 / 156
» Privacy-Preserving Network Aggregation
Sort
View
298 views 119 votes 15 years 24 days ago  ICIP 2010»
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
239 views 134 votes 14 years 6 months ago  INFOCOM 2011»
—Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver’s location information ma...
284 views 129 votes 15 years 12 months ago  EWSN 2010»
The proliferation of sensors in devices of frequent use, such as mobile phones, offers unprecedented opportunities for forming selfselected communities around shared sensory data ...
149 views 125 votes 15 years 2 months ago  JUCS 2008»
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
118 views 129 votes 15 years 9 months ago  BPM 2007»
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
142 views 125 votes 15 years 7 months ago  ICDCSW 2002»
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
173 views 208 votes 16 years 3 months ago  GIS 2008»
In order to provide context?aware Location?Based Services, real location data of mobile users must be collected and analyzed by spatio?temporal data mining methods. However, the d...
191 views 139 votes 15 years 8 months ago  WOWMOM 2006»
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
126 views 132 votes 15 years 1 months ago  IEEESP 2010»
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
166 views 127 votes 14 years 9 months ago  TDP 2010»
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...