• Aucun résultat trouvé

[PDF] Top 20 PROPS: A PRivacy-Preserving Location Proof System

Has 10000 "PROPS: A PRivacy-Preserving Location Proof System" found on our website. Below are the top 20 most common "PROPS: A PRivacy-Preserving Location Proof System".

PROPS: A PRivacy-Preserving Location Proof System

PROPS: A PRivacy-Preserving Location Proof System

... approach a user cannot request a proof for his location until he is close to a reference trusted node, such as an Access Point ...occurs, a protocol is run between the user and ... Voir le document complet

11

A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing

A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing

... m-ticketing system consists of six different phases in our ...m-ticketing system pa- rameters and keys are initialized during the initializa- tion ...enables a user to regis- ter to the transport ... Voir le document complet

26

Capturing Privacy-preserving User Contexts with IndoorHash

Capturing Privacy-preserving User Contexts with IndoorHash

... introduce a privacy-preserving WiFi indoor lo- calization ...client location and lead to potential privacy ...propose a real-time WiFi positioning algorithm with the assistance ... Voir le document complet

18

Distributed Privacy Preserving Platform for Ridesharing Services

Distributed Privacy Preserving Platform for Ridesharing Services

... When a client wants to ride from point A to point B, it sends a Request message to its service ...contains a nonce, a timestamp, and information on the desired types of ...of a ... Voir le document complet

15

Privacy-preserving spectrum sharing

Privacy-preserving spectrum sharing

... incumbent location to inference attacks is ...incumbent’s location is to infer the boundaries of the operational zone (one or more protection ...with a fixed ...two privacy-preserving ... Voir le document complet

203

A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing

A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing

... our system on a standard NFC SIM ...to a back-end server or computations delegation to the smartphone hosting the SIM ...by a malware in- stalled in the ... Voir le document complet

22

Privacy-preserving and secure location authentication

Privacy-preserving and secure location authentication

... within a cooperative gathering approach, a user who needs a location proof can request the other surrounding users to generate such location ...implementing a ... Voir le document complet

128

Distributed Privacy Preserving Platform for Ridesharing Services

Distributed Privacy Preserving Platform for Ridesharing Services

... of a market to a handful of actors that may unilaterally fix their own rules and threaten ...propose a decentralized ridesharing architecture which gives the opportunity to shift from centralized ... Voir le document complet

7

Homomorphic Cryptography-based Privacy-Preserving Network Communications

Homomorphic Cryptography-based Privacy-Preserving Network Communications

... on the nodes’ identities. This probability distribution is then compared to the uniform probability distribution by computing the difference of their Shanon entropy. As the authors themselves underline, the metric ... Voir le document complet

28

Task-Tuning in Privacy-Preserving Crowdsourcing Platforms

Task-Tuning in Privacy-Preserving Crowdsourcing Platforms

... to a context where no central server is trusted, and the result is ...when a termination criterion is met ...outputs a binary tree where each node is a parti- tion of the space of skills with ... Voir le document complet

5

Carpoolers classification while preserving users privacy

Carpoolers classification while preserving users privacy

... as a reminder of section ...represents a sensor frame capture with a collecting interval of 500ms. A general decision in this thesis was to prepare the data as windows of multiple frames, ... Voir le document complet

80

Corrupt Bandits for Preserving Local Privacy

Corrupt Bandits for Preserving Local Privacy

... 0 a , wa) + 1 when T is large ...achieve a desired level of lo- cal differential privacy, and quantify their impact on the ...apply a randomized response mechanism to protect the user ... Voir le document complet

27

Efficient Utility Improvement for Location Privacy

Efficient Utility Improvement for Location Privacy

... that a lot of effort has been dedicated to design and implement methods for protecting the user’s privacy, while preserving the utility and the dependability of location data for their use in ... Voir le document complet

23

Preserving privacy in speaker and speech characterisation

Preserving privacy in speaker and speech characterisation

... As a result, features extracted from speech signals are rarely as consistent as they are for some other ...estimates), privacy-preserving techniques must be applied to biometric models and be robust ... Voir le document complet

41

Towards a Privacy Risk Assessment Methodology for Location-Based Systems

Towards a Privacy Risk Assessment Methodology for Location-Based Systems

... the privacy domain by refining the concept of potential occurrence as attacker capability, which refers to the efforts and resources employed by the threat source to deploy threat events affecting a ... Voir le document complet

6

Intrusion Detections in Collaborative Organizations by Preserving Privacy

Intrusion Detections in Collaborative Organizations by Preserving Privacy

... 1.5 Conclusion In this paper, we proposed a new approach of secured intrusion detection in a col- laborative environment. Via our approach an application can use knowledge from foreign databases to ... Voir le document complet

13

E-squads : a novel paradigm to build privacy-preserving ubiquitous applications

E-squads : a novel paradigm to build privacy-preserving ubiquitous applications

... of a few omniscient players. The encryption problem is now tackled by a majority of the web through Transport Layer Security (TLS) [37], or the newer QUIC protocol [38] (that supersedes TCP alto- ...having ... Voir le document complet

131

Quantifying Interdependent Privacy Risks with Location Data

Quantifying Interdependent Privacy Risks with Location Data

... only a limited proportion of their true co-locations, with probability ν = ...attack a target user, performs an optimal joint inference attack on the target and her co- target, as described in Section ... Voir le document complet

19

From Collaborative to Privacy Preserving Sequential Pattern Mining

From Collaborative to Privacy Preserving Sequential Pattern Mining

... of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent ...the privacy legislations that are ... Voir le document complet

23

Spatial Indexing Techniques for Privacy-Preserving Data Publishing

Spatial Indexing Techniques for Privacy-Preserving Data Publishing

... for privacy preserving location-based queries [10, 9, 19, ...domain, privacy is related to instant location of users and queries as ...provides a Cloaking Region to the ... Voir le document complet

8

Show all 10000 documents...