History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 52 total

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks. (English)
IEEE Trans. Dependable Sec. Comput.IEEE Trans. Dependable Sec. Comput. 12, N0. 3, 256-269(2015)
WorldCat.org
1
PrivGeoCrowd: A toolbox for studying private spatial Crowdsourcing. (English)
ICDE, 1404-1407(2015)
WorldCat.org
2
Differentially-Private Mining of Moderately-Frequent High-Confidence Association Rules. (English)
CODASPY, 13-24(2015)
WorldCat.org
3
Towards efficient private spatial information retrieval using GPUs. (English)
SIGSPATIAL/GIS, 405-408(2014)
WorldCat.org
4
Large-scale frequent subgraph mining in MapReduce. (English)
ICDE, 844-855(2014)
WorldCat.org
5
Guest editorial: location-centric privacy in mobile services. (English)
GeoInformaticaGeoInformatica 18, N0. 1, 93-94(2014)
WorldCat.org
6
A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing. (English)
PVLDBPVLDB 7, N0. 10, 919-930(2014)
WorldCat.org
7
A roadmap for privacy-enhanced secure data provenance. (English)
J. Intell. Inf. Syst.J. Intell. Inf. Syst. 43, N0. 3, 481-501(2014)
WorldCat.org
8
Privacy-preserving publication of provenance workflows. (English)
CODASPY, 159-162(2014)
WorldCat.org
9
Differentially Private Location Recommendations in Geosocial Networks. (English)
MDM (1), 59-68(2014)
WorldCat.org
10
Efficient and accurate strategies for differentially-private sliding window queries. (English)
EDBT, 191-202(2013)
WorldCat.org
11
Privacy for Location-based Services (English)
Privacy for Location-based Services, 1-85(2013)
WorldCat.org
12
LBSN 2012 workshop report: the Fifth ACM SIGSPATIAL International Workshop on Location-Based Social Networks (Redondo Beach, California - November 6, 2012). (English)
SIGSPATIAL SpecialSIGSPATIAL Special 5, N0. 1, 13-14(2013)
WorldCat.org
13
A privacy-preserving location-based alert system. (English)
SIGSPATIAL/GIS, 422-425(2013)
WorldCat.org
14
Authenticating spatial skyline queries with low communication overhead. (English)
CODASPY, 177-180(2013)
WorldCat.org
15
Resilient Authenticated Execution of Critical Applications in Untrusted Environments. (English)
IEEE Trans. Dependable Sec. Comput.IEEE Trans. Dependable Sec. Comput. 9, N0. 4, 597-609(2012)
WorldCat.org
16
Privacy-Preserving Enforcement of Spatially Aware RBAC. (English)
IEEE Trans. Dependable Sec. Comput.IEEE Trans. Dependable Sec. Comput. 9, N0. 5, 627-640(2012)
WorldCat.org
17
A Lightweight Secure Provenance Scheme for Wireless Sensor Networks. (English)
ICPADS, 101-108(2012)
WorldCat.org
18
A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks. (English)
ICDE, 1192-1203(2012)
WorldCat.org
19
Secure sensor network SUM aggregation with detection of malicious nodes. (English)
LCN, 19-27(2012)
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 52 total

Valid XHTML 1.0 Transitional Valid CSS!