欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
会议
> 会议详情页
POSTER: Location privacy leaking from spectrum utilization information in Database-driven Cognitive
所属机构名称:上海交通大学
会议名称:2012 ACM Conference on Computer and Communications Security, CCS 2012
时间:2012.10.16
成果类型:会议
相关项目:下一代互联网安全与隐私关键性技术的研究
作者:
Zhaoyu Gao|Haojin Zhu|Haojin Zhu|Yao Liu|Yao Liu|Muyuan Li|Muyuan Li|Zhenfu Cao|Zhenfu Cao|
同会议论文项目
下一代互联网安全与隐私关键性技术的研究
期刊论文 184
会议论文 113
同项目会议论文
<span style="font-family:;font-size:10.5pt;">Cryptanalysis and improvement of a smar
<span style="font-family:;font-size:10.5pt;">Cryptanalysis and improvement of a smar
<span style="font-family: ;" lang="EN-US" New="" Times=""
<span style="font-family:"";font-size:10.5pt;"><span></span>Ge
<span style="font-family:"";font-size:10.5pt;"><span></span>Ge
<span style="color:black;font-family:"Times New Roman","serif&
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
<span style="font-family:;font-size:10.5pt;">Detecting GPS Information Leakage in An
<span style="font-family:;font-size:10.5pt;">Detecting GPS Information Leakage in An
PriMatch: Fairness-aware Secure Friend Discovery Protocol in Mobile Social Network
PriMatch: Fairness-aware Secure Friend Discovery Protocol in Mobile Social Network
Leveraging Cloud Computing for Outsourced Privacy Preserving Aggregation in Multi-Domain Networks
Leveraging Cloud Computing for Outsourced Privacy Preserving Aggregation in Multi-Domain Networks
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
Location Privacy in Database-driven Cognitive Radio Networks: Attacks and Countermeasures
Location Privacy in Database-driven Cognitive Radio Networks: Attacks and Countermeasures
POSTER: Location privacy leaking from spectrum utilization information in Database-driven Cognitive
Live streaming with content centric networking
Reality check of CCN routing using search processor
Parallelizing FIB lookup in content centric networking
Relative Interpersonal-Influence-Aware Routing in Buffer Constrained Delay-Tolerant Networks
Relative Interpersonal-Influence-Aware Routing in Buffer Constrained Delay-Tolerant Networks
RBRA: A simple and efficient rating-based recommender algorithm to cope with sparsity in recommender
<span style="color: black; font-family: ;" Roman?,?serif?;font-size:10.5pt;?="&quo
<span style="font-family: ; font-size: 10.5pt;" color:black;?="">A Resourc
Large-scale emulation for Content Centric Network
Anonymous identity-based hash proof system and its applications
Anonymous identity-based hash proof system and its applications
Privacy-Preserving Decentralized Access Control for Cloud Storage Systems
Efficient trust based information sharing schemes over distributed collaborative networks
Efficient trust based information sharing schemes over distributed collaborative networks
YouSense: Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing
YouSense: Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing
Anonymous identity-based hash proof system and its applications
Anonymous identity-based hash proof system and its applications
Identity-based extractable hash proofs and their applications
Identity-based extractable hash proofs and their applications
4P_VES: a Collusion-Resistant Accountable Virtual Economy System
4P_VES: a Collusion-Resistant Accountable Virtual Economy System
<span style="font-family:; font-size: 10.5pt;" color:black;"="">YouSe
<span style="font-family:; font-size: 10.5pt;" color:black;"="">YouSe
BDK:Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks
BDK:Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks
CCA secure IB-KEM from the computational bilinear Diffie-Hellman assumption in the standard model
CCA secure IB-KEM from the computational bilinear Diffie-Hellman assumption in the standard model
<span style="font-family:;font-size:10.5pt;">User Self-controllable Profile Matching
<span style="font-family:;font-size:10.5pt;">User Self-controllable Profile Matching
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
<span style="font-family:; font-size: 10.5pt;" color:black;"="">YouSe
<span style="font-family:; font-size: 10.5pt;" color:black;"="">YouSe
<span style="color: black; font-family:;" roman","serif";font-size:10.5p
A data structure for content cache management in content-centric networking
Location privacy preservation in collaborative spectrum sensing
Location privacy preservation in collaborative spectrum sensing
Relative Interpersonal-Influence-Aware Routing in Buffer Constrained Delay-Tolerant Networks
Relative Interpersonal-Influence-Aware Routing in Buffer Constrained Delay-Tolerant Networks
<span style="color: black; font-family: ;" Roman?,?serif?;font-size:10.5pt;?="&quo
<span style="font-family: ;" lang="EN-US" New="" Times=""
Location Privacy in Database-driven Cognitive Radio Networks: Attacks and Countermeasures
Location Privacy in Database-driven Cognitive Radio Networks: Attacks and Countermeasures
<span style="font-family:;font-size:10.5pt;">User Self-controllable Profile Matching
<span style="font-family:;font-size:10.5pt;">User Self-controllable Profile Matching
Garlic: A distributed botnets suppression system
CCA secure IB-KEM from the computational bilinear Diffie-Hellman assumption in the standard model
CCA secure IB-KEM from the computational bilinear Diffie-Hellman assumption in the standard model
Location privacy preservation in collaborative spectrum sensing
Location privacy preservation in collaborative spectrum sensing
YouSense: Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing
YouSense: Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing
Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on e
Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on e
Reformat named data networking with cryptographic message syntax
<span style="font-family:;font-size:10.5pt;">Cryptanalysis and improvement of a smar
<span style="font-family:;font-size:10.5pt;">Cryptanalysis and improvement of a smar
Concurrency Optimized Task Scheduling for Workflows in Cloud
Efficient trust based information sharing schemes over distributed collaborative networks
Efficient trust based information sharing schemes over distributed collaborative networks
Identity-based extractable hash proofs and their applications
Identity-based extractable hash proofs and their applications
Leveraging Cloud Computing for Outsourced Privacy Preserving Aggregation in Multi-Domain Networks
Leveraging Cloud Computing for Outsourced Privacy Preserving Aggregation in Multi-Domain Networks
POSTER: Location privacy leaking from spectrum utilization information in Database-driven Cognitive
POSTER: Location privacy leaking from spectrum utilization information in Database-driven Cognitive
BDK:Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks
BDK:Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks
Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on e
Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on e
<span style="font-family:;font-size:10.5pt;">Detecting GPS Information Leakage in An
<span style="font-family:;font-size:10.5pt;">Detecting GPS Information Leakage in An
CAVD:A Traffic-Camera Assisted Live Video Streaming Delivery Strategy in Vehicular Ad Hoc Networks
Two-level path authentication in EPC global network
Two-level path authentication in EPC global network
A novel workflow based data processing platform as a service
<span style="font-family:;font-size:10.5pt;">An ElGamal-based efficient and privacy-
<span style="font-family:;font-size:10.5pt;">An ElGamal-based efficient and privacy-
4P_VES: a Collusion-Resistant Accountable Virtual Economy System
4P_VES: a Collusion-Resistant Accountable Virtual Economy System
<span style="color: black; font-family: ;" Roman?,?serif?;font-size:10.5pt;?="&quo
Two-level path authentication in EPC global network
Two-level path authentication in EPC global network
<span style="font-family:;font-size:10.5pt;">An ElGamal-based efficient and privacy-
<span style="font-family:;font-size:10.5pt;">An ElGamal-based efficient and privacy-
<span style="font-family:"";font-size:10.5pt;"><span></span>Ge
<span style="font-family:"";font-size:10.5pt;"><span></span>Ge
<span style="font-family: ;" lang="EN-US" new="" times=""
<span lang="EN-US" style="font-family: "Times New Roman",&qu
High speed traffic archiving system for flow granularity storage and querying
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="