Sciweavers

64 search results - page 12 / 13
» Quality Aware Privacy Protection for Location-Based Services
Sort
View
CCS
2006
ACM
13 years 10 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
CCS
2007
ACM
14 years 16 days ago
An algorithm for the appraisal of assurance indicators for complex business processes
In order to provide certified security services we must provide indicators that can measure the level of assurance that a complex business process can offer. Unfortunately the fo...
Fabio Massacci, Artsiom Yautsiukhin
INFOCOM
2008
IEEE
14 years 23 days ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang
WWW
2007
ACM
14 years 7 months ago
Privacy-enhancing personalized web search
Personalized web search is a promising way to improve search quality by customizing search results for people with individual information goals. However, users are uncomfortable w...
Yabo Xu, Ke Wang, Benyu Zhang, Zheng Chen
ICPP
1999
IEEE
13 years 10 months ago
Mobile-Agents for Distributed Market Computing
This paper discusses the implementation using mobile agent and the performance of the market computing to allocate network quality of service most efficiently, based on users'...
Shinji Tanaka, Hirofumi Yamaki, Toru Ishida