[PDF] Top 20 Privacy-preserving and secure location authentication
Has 10000 "Privacy-preserving and secure location authentication" found on our website. Below are the top 20 most common "Privacy-preserving and secure location authentication".
Privacy-preserving and secure location authentication
... end-to-end privacy, whether it is the device manufacturer, the operating system and platform developer, network providers, application developers, data processors and even users ...own privacy ... Voir le document complet
128
Privacy-preserving spectrum sharing
... users and incumbent users in the Federal bands has been considered by regulators, industry, and academia as a great way to enhance productivity and effec- tiveness in spectrum ...new privacy ... Voir le document complet
203
Towards a Privacy-preserving National Identity Card
... it and verifies the validity of the proof and outputs accept or ...the privacy-preserving proof of statements, we suggest to use the recent non-interactive zero-knowledge proofs developed by ... Voir le document complet
21
Capturing Privacy-preserving User Contexts with IndoorHash
... a privacy-preserving WiFi indoor lo- calization ...client location and lead to potential privacy ...APs and collecting training ...measurements and a combined likelihood ... Voir le document complet
18
Spatial Indexing Techniques for Privacy-Preserving Data Publishing
... for privacy preserving location-based queries [10, 9, 19, ...domain, privacy is related to instant location of users and queries as ...the Location-Based ...kd-tree ... Voir le document complet
8
Preserving privacy in speaker and speech characterisation
... inputs and intermediate values for a composition of gates ...AES) and, as such, has the potential to be a more practical privacy-preserving ...inputs and outputs. In an effort to ... Voir le document complet
41
From Collaborative to Privacy Preserving Sequential Pattern Mining
... repository, and conducting analysis on ...approach and hence privacy preserving data mining has gained recognition among academia and organizations as an im- portant and ... Voir le document complet
23
Distributed Privacy Preserving Platform for Ridesharing Services
... 2 and Fig. 3 depict the exchanges and the messages, ...timestamp, and information on the desired types of ...network and is the HMAC of a random number generated by the ...origin and ... Voir le document complet
15
Intrusion Detections in Collaborative Organizations by Preserving Privacy
... is secure, but it is unfortunately not effective because too expensive in term of ...mechanism and adapt parameters to adjust anonymization process according to the needs and bearable ... Voir le document complet
13
Task-Tuning in Privacy-Preserving Crowdsourcing Platforms
... ϵ-differential privacy model applies to a random- ized function f and aims at hiding the impact of any possible individual value on the possible outputs of f , often by adding random noise to ... Voir le document complet
5
Efficient Utility Improvement for Location Privacy
... design and implement methods for protecting the user’s privacy, while preserving the utility and the dependability of location data for their use in location-based ...for ... Voir le document complet
23
Preserving differential privacy under finite-precision semantics
... differential privacy, an approach to privacy that emerged from the area of statistical databases and is now widely applied also in other ...approach, privacy is protected by the addition of ... Voir le document complet
19
Privacy-Preserving Distributed Collaborative Filtering
... users); and (ii ) from the predictive nature of the dissemination (a node sends an item only when it likes ...their location in the interest- based topology ... Voir le document complet
20
PCS, a privacy-preserving certification scheme
... construction, and in order to avoid replay attacks, each authentication session is personalized with a nonce — for instance, the identity of the verifier concatenated with a ...1) and signs the value ... Voir le document complet
20
PROPS: A PRivacy-Preserving Location Proof System
... a location proof system should have the possibility to reveal different granularities of the positions contained in the LPSs he ...Zuo and co- authors propose to solve this problem by the use of multiple ... Voir le document complet
11
Privacy-preserving carpooling
... The location data (origin and destination) of each user is ...on secure multi-party computation techniques. The secure multi-party computation (SMPC) is a set of cryptographic techniques used ... Voir le document complet
5
Authenticated and Privacy-Preserving Consent Management in the Internet of Things
... providers and to secure consent proof generation, we selected the hierarchical identity-based cryptography (HIBC) [ 7 ...public and private key management by a Private Key Generator (PKG) in a ... Voir le document complet
9
Homomorphic Cryptography-based Privacy-Preserving Network Communications
... initialization, and she can not know which nodes initiate communications by this ...dense and when MIXing techniques are employed, if AdvII notices that a node receives k messages in some time frame ... Voir le document complet
28
Practical and Privacy-Preserving TEE Migration
... keys and is re- sponsible of the re-encryption key and transfer authorization ...a secure session between two TEEs after a mutual ...[10] and must be a two ways ...the authentication ... Voir le document complet
17
Distributed Privacy Preserving Platform for Ridesharing Services
... IP and port that can be used for direct communications with the service ...approximate location, and will to achieve a ride that is uniquely identified by a ...ID and an approximate ... Voir le document complet
7
Sujets connexes