Back to Results
First PageMeta Content
Computing / Client–server model / Peer-to-peer / Trusted Computing / Communications protocol / Secure two-party computation / Secure multi-party computation / Cryptographic protocols / Data / Information


Exploring Privacy in Location-based Services Using Cryptographic Protocols
Add to Reading List

Document Date: 2012-01-10 15:06:54


Open Document

File Size: 906,47 KB

Share Result on Facebook

Facility

DOCTOR OF PHILOSOPHY UNIVERSITY OF NORTH TEXAS / College of Engineering James D. Meernik / /

IndustryTerm

cryptographic protocols / trusted computing technology / Location-based services / privacy preserving solutions / privacy-preserving solutions / /

Organization

Graduate School / Department of Computer Science / UNIVERSITY OF NORTH TEXAS / College of Engineering James D. Meernik / /

Person

Stephen R. Tate / Costas Tsatsoulis / Ian Parberry / Ram Dantu / Yan Huang / Armin Mikler / Semi-Honest Model / /

Position

Interim Chair / Professor / Private Information Retrieval / Dean / /

ProvinceOrState

Texas / /

RadioStation

Work 123 / /

Region

NORTH TEXAS / /

Technology

Encryption / Nearest Neighbor Algorithm / trusted computing technology / cell phones / TPM chips / PDA / Peer-To-Peer / two-phase protocols / /

SocialTag