Dimitriou et al., 2012 - Google Patents
PEPPeR: A querier's privacy enhancing protocol for participatory sensingDimitriou et al., 2012
View PDF- Document ID
- 11347968567766109515
- Author
- Dimitriou T
- Krontiris I
- Sabouri A
- Publication year
- Publication venue
- international Conference on Security and Privacy in Mobile Information and Communication Systems
External Links
Snippet
In this work we study the problem of querier privacy in the Participatory Sensing domain. While prior work has attempted to protect the privacy of people contributing sensing data from their mobile phones, little or no work has focused on the problem of querier privacy …
- 235000002566 Capsicum 0 title abstract description 24
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dimitriou et al. | PEPPeR: A querier’s privacy enhancing protocol for participatory sensing | |
Damgård et al. | Balancing privacy and accountability in blockchain identity management | |
Brands | A technical overview of digital credentials | |
Henry et al. | Formalizing anonymous blacklisting systems | |
Wang et al. | Achieving secure and flexible m-services through tickets | |
Silde et al. | Anonymous tokens with public metadata and applications to private contact tracing | |
Han et al. | Privacy-preserving electronic ticket scheme with attribute-based credentials | |
Petrlic et al. | Privacy-preserving reputation management | |
Yi et al. | Location privacy-preserving mobile crowd sensing with anonymous reputation | |
Teranishi et al. | K-times anonymous authentication with a constant proving cost | |
Han et al. | Anonymous single-sign-on for n designated services with traceability | |
Desmoulins et al. | Direct anonymous attestations with dependent basename opening | |
Liu et al. | Efficient e-coupon systems with strong user privacy | |
Liu et al. | pRate: anonymous star rating with rating secrecy | |
Adams | Achieving non‐transferability in credential systems using hidden biometrics | |
Stubblebine et al. | Authentic attributes with fine-grained anonymity protection | |
Hölzl et al. | Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation | |
Özbay et al. | Blacklisting based anonymous authentication scheme for sharing economy | |
Dimitriou | Privacy-respecting rewards for participatory sensing applications | |
Li et al. | A practical forward-secure dualring | |
Yu et al. | Accountable anonymous credentials | |
Zhang et al. | Accountable monero system with privacy protection | |
Larriba et al. | SUVS: Secure unencrypted voting scheme | |
Zhou et al. | The electronic cash system based on non-interactive zero-knowledge proofs | |
Hauser et al. | Street Rep: A Privacy-Preserving Reputation Aggregation System |