Results 31 to 40 of about 676,463 (285)
A Privacy-Preserving Protocol for Utility-Based Routing in DTNs
In the utility-based routing protocol of delay-tolerant networks (DTNs), nodes calculate routing utility value by encounter time, frequency, and so on, and then forward messages according to the utility.
Qingfeng Jiang +3 more
doaj +1 more source
Successive Decode-and-Forward Relaying With Privacy-Aware Interference Suppression
Successive relaying holds the promise of achieving spatial diversity gain for single-antenna users while recovering the multiplexing loss due to the half-duplex relaying in B5G/6G.
Jianjing Wei +3 more
doaj +1 more source
Survey on privacy protection indoor positioning
Smartphones are usually provided with indoor positioning services by third-party positioning service providers, in which the unique privacy leakage risk has become a major factor limiting its development.How to protect the privacy of users and data in ...
Zhiheng WANG, Yanyan XU
doaj +2 more sources
Security and privacy issues of physical objects in the IoT: Challenges and opportunities
In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications. In order to clarify the complicated security and privacy issues, the life cycle of a physical object is divided into three stages of
Xuanxia Yao +5 more
doaj +1 more source
A Forward Privacy Model for RFID Authentication Protocols [PDF]
In this paper, we propose a new variant of indistinguishability-based security model for the RFID authentication protocol, which allows an adversary to obtain an authentication result and secret key of a target tag. Ng et al. showed that symmetric-key based RFID authentication protocols cannot be resilient to the above information leakage ...
Moriyama, Daisuke +2 more
openaire +1 more source
Location Privacy Protection in Contention Based Forwarding for VANETs [PDF]
Compared to traditional wireless network routing protocols, geographic routing provides superior scalability and thus is widely used in vehicular ad hoc networks (VANETs). However, it requires every vehicle to broadcast its location information to its neighboring nodes, and this process will compromise user's location privacy.
Qing Yang +3 more
openaire +1 more source
Quantitative information flow, with a view [PDF]
We put forward a general model intended for assessment of system security against passive eavesdroppers, both quantitatively ( how much information is leaked) and qualitatively ( what properties are leaked).
A. Narayanan +12 more
core +1 more source
Especially in the Big Data era, the usage of different classification methods is increasing day by day. The success of these classification methods depends on the effectiveness of learning methods.
Çatak, Ferhat Özgür
core +1 more source
Quantifying Differential Privacy in Continuous Data Release under Temporal Correlations [PDF]
Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives to continuously release private data for protecting privacy at
Cao, Yang +3 more
core +2 more sources
Privacy Protection Method in the Era of Cloud Computing and Big Data
Cloud Computing has become the academic and industrial hotspot in China in recent years. Cloud Computing can help business clients manage finance more conveniently and efficiently. It can also reduce the protection of privacy.
Liu Ying
doaj +1 more source

