History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 45 total

Guest editorial: location-centric privacy in mobile services. (English)
GeoInformaticaGeoInformatica 18, N0. 1, 93-94(2014)
WorldCat.org
1
An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical. (English)
CODASPY, 321-332(2014)
WorldCat.org
2
Privacy-preserving publication of provenance workflows. (English)
CODASPY, 159-162(2014)
WorldCat.org
3
Authenticating spatial skyline queries with low communication overhead. (English)
CODASPY, 177-180(2013)
WorldCat.org
4
Efficient and accurate strategies for differentially-private sliding window queries. (English)
EDBT, 191-202(2013)
WorldCat.org
5
A privacy-preserving location-based alert system. (English)
SIGSPATIAL/GIS, 422-425(2013)
WorldCat.org
6
Privacy for Location-based Services (English)
Privacy for Location-based Services, 1-85(2013)
WorldCat.org
7
LBSN 2012 workshop report: the Fifth ACM SIGSPATIAL International Workshop on Location-Based Social Networks (Redondo Beach, California - November 6, 2012). (English)
SIGSPATIAL SpecialSIGSPATIAL Special 5, N0. 1, 13-14(2013)
WorldCat.org
8
A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks. (English)
ICDE, 1192-1203(2012)
WorldCat.org
9
A Comparative Evaluation of Private Information Retrieval Techniques in Location-Based Services. (English)
INCoS, 618-623(2012)
WorldCat.org
10
A Hybrid Approach to Private Record Matching. (English)
IEEE Trans. Dependable Sec. Comput.IEEE Trans. Dependable Sec. Comput. 9, N0. 5, 684-698(2012)
WorldCat.org
11
Secure sensor network SUM aggregation with detection of malicious nodes. (English)
LCN, 19-27(2012)
WorldCat.org
12
SPRINGL 2011 Workshop Report: the Fourth ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS: (Chicago, Illinois - November 1, 2011). (English)
SIGSPATIAL SpecialSIGSPATIAL Special 4, N0. 1, 16-17(2012)
WorldCat.org
13
A Lightweight Secure Provenance Scheme for Wireless Sensor Networks. (English)
ICPADS, 101-108(2012)
WorldCat.org
14
Resilient Authenticated Execution of Critical Applications in Untrusted Environments. (English)
IEEE Trans. Dependable Sec. Comput.IEEE Trans. Dependable Sec. Comput. 9, N0. 4, 597-609(2012)
WorldCat.org
15
Privacy-Preserving Enforcement of Spatially Aware RBAC. (English)
IEEE Trans. Dependable Sec. Comput.IEEE Trans. Dependable Sec. Comput. 9, N0. 5, 627-640(2012)
WorldCat.org
16
The optimization of situational awareness for insider threat detection. (English)
CODASPY, 231-236(2011)
WorldCat.org
17
Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection. (English)
GeoInformaticaGeoInformatica 15, N0. 4, 699-726(2011)
WorldCat.org
18
Anonymous Publication of Sensitive Transactional Data. (English)
IEEE Trans. Knowl. Data Eng.IEEE Trans. Knowl. Data Eng. 23, N0. 2, 161-174(2011)
WorldCat.org
19
Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper. (English)
ASIACCS, 10-19(2011)
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 45 total

Valid XHTML 1.0 Transitional Valid CSS!