A taxonomy of approaches to preserve location privacy in location-based services
A Khoshgozaran, C Shahabi - International Journal of …, 2010 - inderscienceonline.com
The ubiquity of smartphones and other location-aware hand-held devices has resulted in a
dramatic increase in popularity of location-based services (LBS) tailored to users' locations …
dramatic increase in popularity of location-based services (LBS) tailored to users' locations …
Ensuring correctness, completeness, and freshness for outsourced tree-indexed data
TK Dang - Information Resources Management: Concepts …, 2010 - igi-global.com
In an outsourced database service model, query assurance takes an important role among
well-known security issues. To the best of our knowledge, however, none of the existing …
well-known security issues. To the best of our knowledge, however, none of the existing …
Database access pattern protection without full-shuffles
Privacy protection is one of the fundamental security requirements for database outsourcing.
A major threat is information leakage from database access patterns generated by query …
A major threat is information leakage from database access patterns generated by query …
Small, stupid, and scalable: secure computing with faerieplay
A Iliev, SW Smith - Proceedings of the fifth ACM workshop on Scalable …, 2010 - dl.acm.org
How can Agnes trust a computation C occurring at Boris's computer? In particular, how can
Agnes can trust that C is occurring without Boris even being able to observe its internal …
Agnes can trust that C is occurring without Boris even being able to observe its internal …
[PDF][PDF] Preserving access privacy over large databases
F Olumofin, I Goldberg - 2010 - Citeseer
Anonymity systems preserve the identities of users as they access Internet data sources. The
security of many such systems, such as Tor, relies on a model where the adversary does not …
security of many such systems, such as Tor, relies on a model where the adversary does not …
A new hardware-assisted PIR with O(n) shuffle cost
Since the concept of private information retrieval (PIR) was first formalized by Chor et al.,
various constructions have been proposed with a common goal of reducing communication …
various constructions have been proposed with a common goal of reducing communication …
Reconstruction of falsified computer logs for digital forensics investigations
Digital forensics investigations aim to find evidence that helps confirm or disprove a
hypothesis about an alleged computer-based crime. However, the ease with which …
hypothesis about an alleged computer-based crime. However, the ease with which …
Investigation on effectiveness of a prefabricated vertical drain during cyclic loading
B Indraratna, J Ni… - IOP Conference Series …, 2010 - iopscience.iop.org
The effectiveness of prefabricated vertical drains (PVDs) in enhancing the stability of soft
soils during cyclic loading was investigated using triaxial cyclic loading tests. Both …
soils during cyclic loading was investigated using triaxial cyclic loading tests. Both …
Security issues in outsourced xml databases
TK Dang - IT Outsourcing: Concepts, Methodologies, Tools, and …, 2010 - igi-global.com
In an outsourced XML database service model, organizations rely upon the premises of
external service providers for the storage and retrieval management of their XML data …
external service providers for the storage and retrieval management of their XML data …
Secure coprocessor-based private information retrieval without periodical preprocessing
P Wang, H Wang, J Pieprzyk - 2010 - ro.uow.edu.au
Abstract Early works on Private Information Retrieval (PIR) focused on minimizing the
necessary communication overhead. They seemed to achieve this goal but at the expense …
necessary communication overhead. They seemed to achieve this goal but at the expense …