Search For:

Displaying 1-4 out of 4 total
SensorTune: a mobile auditory interface for DIY wireless sensor networks
Found in: Proceedings of the 28th international conference on Human factors in computing systems (CHI '10)
By Enrico Costanza, Guillaume Zufferey, Jacques Panchard, Jean-Pierre Hubaux, Jeffrey Huang, Julien Freudiger, Julien Nembrini
Issue Date:April 2010
pp. 2317-2326
Wireless Sensor Networks (WSNs) allow the monitoring of activity or environmental conditions over a large area, from homes to industrial plants, from agriculture fields to forests and glaciers. They can support a variety of applications, from assisted livi...
     
Unraveling an old cloak: k-anonymity for location privacy
Found in: Proceedings of the 9th annual ACM workshop on Privacy in the electronic society (WPES '10)
By Carmela Troncoso, Claudia Diaz, Jean-Pierre Hubaux, Julien Freudiger, Reza Shokri
Issue Date:October 2010
pp. 115-118
There is a rich collection of literature that aims at protecting the privacy of users querying location-based services. One of the most popular location privacy techniques consists in cloaking users' locations such that k users appear as potential senders ...
     
A distortion-based metric for location privacy
Found in: Proceedings of the 8th ACM workshop on Privacy in the electronic society (WPES '09)
By Jean-Pierre Hubaux, Julien Freudiger, Murtuza Jadliwala, Reza Shokri
Issue Date:November 2009
pp. 21-30
We propose a novel framework for measuring and evaluating location privacy preserving mechanisms in mobile wireless networks. Within this framework, we first present a formal model of the system, which provides an efficient representation of the network us...
     
On non-cooperative location privacy: a game-theoretic analysis
Found in: Proceedings of the 16th ACM conference on Computer and communications security (CCS '09)
By David C. Parkes, Jean-Pierre Hubaux, Julien Freudiger, Mohammad Hossein Manshaei
Issue Date:November 2009
pp. 324-337
In mobile networks, authentication is a required primitive for the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudonyms used for authentication. A frequently proposed solution to protect loca...
     
 1