Sciweavers

3504 search results - page 560 / 701
» Secure protocol composition
Sort
View
159
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
Location privacy preservation in collaborative spectrum sensing
—Collaborative spectrum sensing has been regarded as a promising approach to enable secondary users to detect primary users by exploiting spatial diversity. In this paper, we con...
Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Ka...
132
Voted
EUROCRYPT
2009
Springer
16 years 3 months ago
Key Agreement from Close Secrets over Unsecured Channels
We consider information-theoretic key agreement between two parties sharing somewhat different versions of a secret w that has relatively little entropy. Such key agreement, also ...
Bhavana Kanukurthi, Leonid Reyzin
112
Voted
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 3 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
130
Voted
EDBT
2008
ACM
172views Database» more  EDBT 2008»
16 years 2 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...
107
Voted
MOBISYS
2005
ACM
16 years 2 months ago
MediaAlert: a broadcast video monitoring and alerting system for mobile users
? We present a system for automatic monitoring and timely dissemination of multimedia information to a range of mobile information appliances based on each user's interest pro...
Bin Wei, Bernard Renger, Yih-Farn Chen, Rittwik Ja...