Sciweavers

1551 search results - page 8 / 156
» Privacy-Preserving Network Aggregation
Sort
View
190 views 127 votes 15 years 9 months ago  INFOCOM 2009»
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
172 views 127 votes 15 years 8 months ago  EDBT 2010»
User privacy in location-based services has attracted great interest in the research community. We introduce a novel framework based on a decentralized architecture for privacy pr...
131 views 105 votes 15 years 9 months ago  ESORICS 2009»
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
150 views 140 votes 15 years 8 months ago  LCN 2006»
Vehicular networks will become an important component for information accesses in one’s daily life. A vehicular network provides a vehicular user not only chances to communicate...
204 views 113 votes 16 years 3 months ago  ESORICS 2009»
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
274 views 113 votes 15 years 7 months ago  SIGMOD 2010»
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
144 views 138 votes 15 years 9 months ago  WCNC 2008»
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
229 views 218 votes 14 years 6 months ago  INFOCOM 2011»
—This paper addresses the problem of identifying the top-k information hubs in a social network. Identifying topk information hubs is crucial for many applications such as advert...
279 views 143 votes 14 years 6 months ago  PERCOM 2011»
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
125 views 142 votes 15 years 4 months ago  DMIN 2006»
In this paper, we propose a post randomization technique to learn a Bayesian network (BN) from distributed heterogeneous data, in a privacy sensitive fashion. In this case, two or ...