Mix-Zones for Location Privacy in Vehicular Networks
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). In these so called vehicular ad hoc networks (VANETs) security and privacy are crucial factors for successful deployment. In a scenario, where each ...
The author focuses on the cryptographic protection of e-passports, working from the assumption that even if people can peacefully live with their e- passports, what sort of cryptography technology is involved here? Can e- passport holders protect their pri ...
To document an individual's longitudinal construction of risk is a logistically intensive task. To identify a logistically feasible approach, we review existing agent-based experience documentation approaches within the context of a specified risk source - ...
Taylor & Francis Inc, 1900 Frost Road, Suite 101, Bristol, Pa 19007 Usa2007
This paper presents the research activities carried out within the scope of the Liaison project. Most of the work has been performed on WiFi location. WiFi is nowadays widely deployed in buildings such as hotels, hospitals, airports, train stations, public ...
Ad hoc networks are expected to be used in many different situations. A common characteristic among these situations is that the nodes have to cooperate with each other. This problem is particularly crucial, if each node is its own authority. Reckoning the ...
RFID systems makes it possible for a server to identify known tags in wireless settings. As they become more and more pervasive, people privacy is more and more threatened. In this talk, we list a few models for privacy in RFID and compare them. We review ...
We present a scheme for secure and privacy-preserving communication in hybrid ad hoc networks. Our scheme enables users to secure communication and to protect their anonymity and location privacy. Our approach is based on frequently changing node pseudonym ...
Optimistic atomic broadcast: a pragmatic viewpoint F.Pedone and A.Schiper This paper presents the Optimistic Atomic Broadcast algorithm (OPT-ABcast) which exploits the spontaneous total-order property experienced in local-area networks in order to allow fa ...
So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial setting. In this work, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure pos ...
This paper considers the problem of routing in a wide area mobile ad-hoc network called Terminode Network. Our routing scheme is a combination of two protocols called Termin-ode Local Routing (TLR) and Terminode Remote Routing (TRR). TRR is activated when ...