搜索结果: 1-15 共查到“军事学 Location”相关记录16条 . 查询时间(0.046 秒)
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query
Location privacy Geohashing Spatial cloaking
2019/7/17
Location data is an important piece of contextual information in location-driven features for geosocial and pervasive computing applications. In this paper, we propose to geo-hash locations using spac...
Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version)
side-channel analysis location privacy
2019/5/13
Inspired by the literature on side-channel attacks against cryptographic implementations, we describe a framework for the analysis of location privacy. It allows us to revisit (continuous) re-identifi...
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
Side-channel analysis location leakage microprobe
2019/3/4
Near-field microprobes have the capability to isolate small regions of a chip surface and enable precise measurements with high spatial resolution. Being able to distinguish the activity of small regi...
Faster Privacy-Preserving Location Proximity Schemes
Location Privacy Proximity Secure Computation
2018/7/20
In the last decade, location information became easily obtainable using off-the-shelf mobile devices. This gave a momentum to developing Location Based Services (LBSs) such as location proximity detec...
Location-Proof System based on Secure Multi-Party Computations
Location Proof System Multi-Party Computations Secure Maximum Protocol
2018/6/5
Location-based services are now quite popular. The variety of applications and their numerous users show it clearly. However, these applications rely on the persons' honesty to use their real location...
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data
reachability location privacy homomorphic encryption
2017/8/2
Reachability, which answers whether one person is reachable from another through a sequence of contacts within a period of time, is of great importance in many domains such as social behavior analysis...
ANOTEL: Cellular Networks with Location Privacy (Extended Version)
location management separation of concerns location privacy
2016/12/10
Location management is a key component of cellular networks. From a privacy perspective, however, it is also a major weakness: location management empowers the network operator to track users. In toda...
Co-location detection on the Cloud
Co-location in Cloud Software Profiling Cache Covert Channel
2016/3/16
In this work we focus on the problem of co-location as a
first step of conducting Cross-VM attacks such as Prime and Probe or
Flush+Reload in commercial clouds. We demonstrate and compare three
co-...
PrAd: Enabling Privacy-Aware Location based Advertising
Privacy-Preserving Location-based Advertising
2016/2/23
Smart phones and mobile devices have become more and more ubiquitous recently. This ubiquity gives chance for mobile advertising, especially location-based advertising, to develop into a very promisin...
Spatial Bloom Filters: Enabling Privacy in Location-aware Applications
Location Privacy Bloom Filters Secure Multi-party Computation
2016/1/8
The wide availability of inexpensive positioning systems made
it possible to embed them into smartphones and other personal devices.
This marked the beginning of location-aware applications, where u...
We consider the problem of designing multi-tenant public infrastructure clouds resistant to
cross-VM attacks without relying on single-tenancy or on assumptions about the cloud’s servers.
In a cross...
Large-scale datasets of consumer behavior might revolutionize
the way we gain competitive advantages and increase
our knowledge in the respective domains. At the
same time, valuable datasets pose p...
Cryptographically Protected Prefixes for Location Privacy in IPv6
Network layer location privacy address encryption
2014/3/12
There is a growing concern with preventing unauthorized agents from discovering the geographical location of Internet users, a kind of security called location privacy. Typical deployments of IPv6 mak...
Location Leakage in Distance Bounding: Why Location Privacy does not Work
relay attacks location privacy distance-bounding authentication
2014/3/5
In many cases, we can only have access to a service by proving we are sufficiently close to a particular location (e.g. in automobile or building access control). In these cases, proximity can be guar...
On a New Formal Proof Model for RFID Location Privacy
Location privacy untraceability RFID
2009/6/10
We discuss a new formal proof model for RFID location privacy,
recently proposed at ESORICS 2008.
We show that protocols which intuitively and in several other models
are considered not to be locat...