Sciweavers

1573 search results - page 151 / 315
» Strong User Authentication
Sort
View
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 11 months ago
Identifying Unsafe Routes for Network-Based Trajectory Privacy.
In this paper, we propose a privacy model that offers trajectory privacy to the requesters of Location-Based Services (LBSs), by utilizing an underlying network of user movement. ...
Aris Gkoulalas-Divanis, Mohamed F. Mokbel, Vassili...
TMC
2012
13 years 4 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
HT
2011
ACM
14 years 5 months ago
Personalisation in the wild: providing personalisation across semantic, social and open-web resources
One of the key motivating factors for information providers to use personalisation is to maximise the benefit to the user in accessing their content. However, traditionally such s...
Ben Steichen, Alexander O'Connor, Vincent Wade
ICPADS
2005
IEEE
15 years 7 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
ESEC
1999
Springer
15 years 6 months ago
Checking Progress with Action Priority: Is it Fair?
The liveness characteristics of a system are intimately related to the notion of fairness. However, the task of explicitly modelling fairness constraints is complicated in practice...
Dimitra Giannakopoulou, Jeff Magee, Jeff Kramer