[PDF] Top 20 PROPS: A PRivacy-Preserving Location Proof System
Has 10000 "PROPS: A PRivacy-Preserving Location Proof System" found on our website. Below are the top 20 most common "PROPS: A PRivacy-Preserving Location Proof System".
PROPS: A PRivacy-Preserving Location Proof System
... approach a user cannot request a proof for his location until he is close to a reference trusted node, such as an Access Point ...occurs, a protocol is run between the user and ... Voir le document complet
11
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing
... m-ticketing system consists of six different phases in our ...m-ticketing system pa- rameters and keys are initialized during the initializa- tion ...enables a user to regis- ter to the transport ... Voir le document complet
26
Capturing Privacy-preserving User Contexts with IndoorHash
... introduce a privacy-preserving WiFi indoor lo- calization ...client location and lead to potential privacy ...propose a real-time WiFi positioning algorithm with the assistance ... Voir le document complet
18
Distributed Privacy Preserving Platform for Ridesharing Services
... When a client wants to ride from point A to point B, it sends a Request message to its service ...contains a nonce, a timestamp, and information on the desired types of ...of a ... Voir le document complet
15
Privacy-preserving spectrum sharing
... incumbent location to inference attacks is ...incumbent’s location is to infer the boundaries of the operational zone (one or more protection ...with a fixed ...two privacy-preserving ... Voir le document complet
203
A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing
... our system on a standard NFC SIM ...to a back-end server or computations delegation to the smartphone hosting the SIM ...by a malware in- stalled in the ... Voir le document complet
22
Privacy-preserving and secure location authentication
... within a cooperative gathering approach, a user who needs a location proof can request the other surrounding users to generate such location ...implementing a ... Voir le document complet
128
Distributed Privacy Preserving Platform for Ridesharing Services
... of a market to a handful of actors that may unilaterally fix their own rules and threaten ...propose a decentralized ridesharing architecture which gives the opportunity to shift from centralized ... Voir le document complet
7
Homomorphic Cryptography-based Privacy-Preserving Network Communications
... on the nodes’ identities. This probability distribution is then compared to the uniform probability distribution by computing the difference of their Shanon entropy. As the authors themselves underline, the metric ... Voir le document complet
28
Task-Tuning in Privacy-Preserving Crowdsourcing Platforms
... to a context where no central server is trusted, and the result is ...when a termination criterion is met ...outputs a binary tree where each node is a parti- tion of the space of skills with ... Voir le document complet
5
Carpoolers classification while preserving users privacy
... as a reminder of section ...represents a sensor frame capture with a collecting interval of 500ms. A general decision in this thesis was to prepare the data as windows of multiple frames, ... Voir le document complet
80
Corrupt Bandits for Preserving Local Privacy
... 0 a , wa) + 1 when T is large ...achieve a desired level of lo- cal differential privacy, and quantify their impact on the ...apply a randomized response mechanism to protect the user ... Voir le document complet
27
Efficient Utility Improvement for Location Privacy
... that a lot of effort has been dedicated to design and implement methods for protecting the user’s privacy, while preserving the utility and the dependability of location data for their use in ... Voir le document complet
23
Preserving privacy in speaker and speech characterisation
... As a result, features extracted from speech signals are rarely as consistent as they are for some other ...estimates), privacy-preserving techniques must be applied to biometric models and be robust ... Voir le document complet
41
Towards a Privacy Risk Assessment Methodology for Location-Based Systems
... the privacy domain by refining the concept of potential occurrence as attacker capability, which refers to the efforts and resources employed by the threat source to deploy threat events affecting a ... Voir le document complet
6
Intrusion Detections in Collaborative Organizations by Preserving Privacy
... 1.5 Conclusion In this paper, we proposed a new approach of secured intrusion detection in a col- laborative environment. Via our approach an application can use knowledge from foreign databases to ... Voir le document complet
13
E-squads : a novel paradigm to build privacy-preserving ubiquitous applications
... of a few omniscient players. The encryption problem is now tackled by a majority of the web through Transport Layer Security (TLS) [37], or the newer QUIC protocol [38] (that supersedes TCP alto- ...having ... Voir le document complet
131
Quantifying Interdependent Privacy Risks with Location Data
... only a limited proportion of their true co-locations, with probability ν = ...attack a target user, performs an optimal joint inference attack on the target and her co- target, as described in Section ... Voir le document complet
19
From Collaborative to Privacy Preserving Sequential Pattern Mining
... of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent ...the privacy legislations that are ... Voir le document complet
23
Spatial Indexing Techniques for Privacy-Preserving Data Publishing
... for privacy preserving location-based queries [10, 9, 19, ...domain, privacy is related to instant location of users and queries as ...provides a Cloaking Region to the ... Voir le document complet
8
Sujets connexes