Search For:

Displaying 1-14 out of 14 total
Hover: Trustworthy Elections with Hash-Only Verification
Found in: IEEE Security & Privacy
By Aleksander Essex,Urs Hengartner
Issue Date:September 2012
pp. 18-24
Hover (Hash-Only Verification), an end-to-end (E2E) verifiable voting system with distributed trust, uses only a collision-resistant hash function for verification. Such verification could make E2E elections more accessible to people without a strong crypt...
 
FaceCloak: An Architecture for User Privacy on Social Networking Sites
Found in: Computational Science and Engineering, IEEE International Conference on
By Wanying Luo, Qi Xie, Urs Hengartner
Issue Date:August 2009
pp. 26-33
Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports ab...
 
A distributed k-anonymity protocol for location privacy
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Ge Zhong, Urs Hengartner
Issue Date:March 2009
pp. 1-10
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person's location might allow the service to re-identify the person. Location privacy based on k-anonymity addresses this threat by cloaking th...
 
Hiding Location Information from Location-Based Services
Found in: Mobile Data Management, IEEE International Conference on
By Urs Hengartner
Issue Date:May 2007
pp. 268-272
No summary available.
 
Distributed, Uncertainty-Aware Access Control for Pervasive Computing
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Urs Hengartner, Ge Zhong
Issue Date:March 2007
pp. 241-246
Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for environments that are managed by a centralized administrator. We demonstrate th...
 
Avoiding Privacy Violations Caused by Context-Sensitive Services
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Urs Hengartner, Peter Steenkiste
Issue Date:March 2006
pp. 222-233
The increasing availability of information about people?s context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a service is limited depending on a person?s context. For example, a location-based s...
 
Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information
Found in: Security and Privacy for Emerging Areas in Communications Networks, International Conference on
By Urs Hengartner, Peter Steenkiste
Issue Date:September 2005
pp. 384-396
Access control to confidential information in pervasive computing environments is challenging for multiple reasons: First, a client requesting access might not know which access rights are necessary in order to be granted access to the requested informatio...
 
Exploiting Information Relationships for Access Control
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Urs Hengartner, Peter Steenkiste
Issue Date:March 2005
pp. 269-278
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensitive information, these environments need to take relationships between inform...
 
TPC welcome welcome message from the technical program chairs
Found in: 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom)
By George Roussos,Urs Hengartner,Shin'ichi Konomi,Kay Romer
Issue Date:March 2014
pp. 1
A warm welcome to the Twelfth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2014). We are pleased to introduce the technical program of the conference which this year includes 25 papers representing high-quality res...
   
VeriPlace: a privacy-aware location proof architecture
Found in: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS '10)
By Urs Hengartner, Wanying Luo
Issue Date:November 2010
pp. 23-32
Recently, there has been a dramatic increase in the number of location-based services, with services like Foursquare or Yelp having hundreds of thousands of users. A user's location is a crucial factor for enabling these services. Many services rely on use...
     
Proving your location without giving up your privacy
Found in: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (HotMobile '10)
By Urs Hengartner, Wanying Luo
Issue Date:February 2010
pp. 7-12
Although location-based applications have existed for several years, verifying the correctness of a user's claimed location is a challenge that has only recently gained attention in the research community. Existing architectures for the generation and veri...
     
Toward a distributed k-anonymity protocol for location privacy
Found in: Proceedings of the 7th ACM workshop on Privacy in the electronic society (WPES '08)
By Ge Zhong, Urs Hengartner
Issue Date:October 2008
pp. 53-62
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person's location might allow the service to re-identify the person. Location privacy based on k-anonymity addresses this threat by cloaking th...
     
Access control to people location information
Found in: ACM Transactions on Information and System Security (TISSEC)
By Peter Steenkiste, Urs Hengartner
Issue Date:November 2005
pp. 424-456
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person's current location is a sensitive piece of information that only authorized entities should be able to learn. Several challenges arise in the...
     
Detection and analysis of routing loops in packet traces
Found in: Proceedings of the second ACM SIGCOMM Workshop on Internet measurment workshop (IMW '02)
By Christophe Diot, Richard Mortier, Sue Moon, Urs Hengartner
Issue Date:November 2002
pp. 107-112
Routing loops are caused by inconsistencies in routing state among a set of routers. They occur in perfectly engineered networks, and have a detrimental effect on performance. They impact end-to-end performance through increased packet loss and delay for p...
     
 1