Sciweavers

888 search results - page 21 / 178
» Providing Mobile Users' Anonymity in Hybrid Networks
Sort
View
PERCOM
2009
ACM
15 years 6 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
JASIS
2006
108views more  JASIS 2006»
14 years 11 months ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...
SIGCOMM
2003
ACM
15 years 5 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
WECWIS
2000
IEEE
144views ECommerce» more  WECWIS 2000»
15 years 4 months ago
An Architecture to Support Distributed Data Mining Services in E-Commerce Environments
This paper presents our hybrid architectural model for Distributed Data Mining (DDM) which is tailored to meet the needs of e-businesses where application service providers sell D...
Shonali Krishnaswamy, Arkady B. Zaslavsky, Seng Wa...
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 6 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith