• Aucun résultat trouvé

[PDF] Top 20 Privacy-preserving and secure location authentication

Has 10000 "Privacy-preserving and secure location authentication" found on our website. Below are the top 20 most common "Privacy-preserving and secure location authentication".

Privacy-preserving and secure location authentication

Privacy-preserving and secure location authentication

... end-to-end privacy, whether it is the device manufacturer, the operating system and platform developer, network providers, application developers, data processors and even users ...own privacy ... Voir le document complet

128

Privacy-preserving spectrum sharing

Privacy-preserving spectrum sharing

... users and incumbent users in the Federal bands has been considered by regulators, industry, and academia as a great way to enhance productivity and effec- tiveness in spectrum ...new privacy ... Voir le document complet

203

Towards a Privacy-preserving National Identity Card

Towards a Privacy-preserving National Identity Card

... it and verifies the validity of the proof and outputs accept or ...the privacy-preserving proof of statements, we suggest to use the recent non-interactive zero-knowledge proofs developed by ... Voir le document complet

21

Capturing Privacy-preserving User Contexts with IndoorHash

Capturing Privacy-preserving User Contexts with IndoorHash

... a privacy-preserving WiFi indoor lo- calization ...client location and lead to potential privacy ...APs and collecting training ...measurements and a combined likelihood ... Voir le document complet

18

Spatial Indexing Techniques for Privacy-Preserving Data Publishing

Spatial Indexing Techniques for Privacy-Preserving Data Publishing

... for privacy preserving location-based queries [10, 9, 19, ...domain, privacy is related to instant location of users and queries as ...the Location-Based ...kd-tree ... Voir le document complet

8

Preserving privacy in speaker and speech characterisation

Preserving privacy in speaker and speech characterisation

... inputs and intermediate values for a composition of gates ...AES) and, as such, has the potential to be a more practical privacy-preserving ...inputs and outputs. In an effort to ... Voir le document complet

41

From Collaborative to Privacy Preserving Sequential Pattern Mining

From Collaborative to Privacy Preserving Sequential Pattern Mining

... repository, and conducting analysis on ...approach and hence privacy preserving data mining has gained recognition among academia and organizations as an im- portant and ... Voir le document complet

23

Distributed Privacy Preserving Platform for Ridesharing Services

Distributed Privacy Preserving Platform for Ridesharing Services

... 2 and Fig. 3 depict the exchanges and the messages, ...timestamp, and information on the desired types of ...network and is the HMAC of a random number generated by the ...origin and ... Voir le document complet

15

Intrusion Detections in Collaborative Organizations by Preserving Privacy

Intrusion Detections in Collaborative Organizations by Preserving Privacy

... is secure, but it is unfortunately not effective because too expensive in term of ...mechanism and adapt parameters to adjust anonymization process according to the needs and bearable ... Voir le document complet

13

Task-Tuning in Privacy-Preserving Crowdsourcing Platforms

Task-Tuning in Privacy-Preserving Crowdsourcing Platforms

... ϵ-differential privacy model applies to a random- ized function f and aims at hiding the impact of any possible individual value on the possible outputs of f , often by adding random noise to ... Voir le document complet

5

Efficient Utility Improvement for Location Privacy

Efficient Utility Improvement for Location Privacy

... design and implement methods for protecting the user’s privacy, while preserving the utility and the dependability of location data for their use in location-based ...for ... Voir le document complet

23

Preserving differential privacy under finite-precision semantics

Preserving differential privacy under finite-precision semantics

... differential privacy, an approach to privacy that emerged from the area of statistical databases and is now widely applied also in other ...approach, privacy is protected by the addition of ... Voir le document complet

19

Privacy-Preserving Distributed Collaborative Filtering

Privacy-Preserving Distributed Collaborative Filtering

... users); and (ii ) from the predictive nature of the dissemination (a node sends an item only when it likes ...their location in the interest- based topology ... Voir le document complet

20

PCS, a privacy-preserving certification scheme

PCS, a privacy-preserving certification scheme

... construction, and in order to avoid replay attacks, each authentication session is personalized with a nonce — for instance, the identity of the verifier concatenated with a ...1) and signs the value ... Voir le document complet

20

PROPS: A PRivacy-Preserving Location Proof System

PROPS: A PRivacy-Preserving Location Proof System

... a location proof system should have the possibility to reveal different granularities of the positions contained in the LPSs he ...Zuo and co- authors propose to solve this problem by the use of multiple ... Voir le document complet

11

Privacy-preserving carpooling

Privacy-preserving carpooling

... The location data (origin and destination) of each user is ...on secure multi-party computation techniques. The secure multi-party computation (SMPC) is a set of cryptographic techniques used ... Voir le document complet

5

Authenticated and Privacy-Preserving Consent Management in the Internet of Things

Authenticated and Privacy-Preserving Consent Management in the Internet of Things

... providers and to secure consent proof generation, we selected the hierarchical identity-based cryptography (HIBC) [ 7 ...public and private key management by a Private Key Generator (PKG) in a ... Voir le document complet

9

Homomorphic Cryptography-based Privacy-Preserving Network Communications

Homomorphic Cryptography-based Privacy-Preserving Network Communications

... initialization, and she can not know which nodes initiate communications by this ...dense and when MIXing techniques are employed, if AdvII notices that a node receives k messages in some time frame ... Voir le document complet

28

Practical and Privacy-Preserving TEE Migration

Practical and Privacy-Preserving TEE Migration

... keys and is re- sponsible of the re-encryption key and transfer authorization ...a secure session between two TEEs after a mutual ...[10] and must be a two ways ...the authentication ... Voir le document complet

17

Distributed Privacy Preserving Platform for Ridesharing Services

Distributed Privacy Preserving Platform for Ridesharing Services

... IP and port that can be used for direct communications with the service ...approximate location, and will to achieve a ride that is uniquely identified by a ...ID and an approximate ... Voir le document complet

7

Show all 10000 documents...