![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Optimal noise functions for location privacy on continuous regions
Users of location-based services are highly vulnerable to privacy risks since they need to disclose, at least partially, their locations to benefit from these services. One possibility to limit these risks is ...
-
Chapter
Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms
Differential privacy is a notion of privacy that was initially designed for statistical databases, and has been recently extended to a more general class of domains. Both differential privacy and its generaliz...
-
Chapter and Conference Paper
An HMM-Based Reputation Model
In modern global networks, principals usually have incomplete information about each other. Therefore trust and reputation frameworks have been recently adopted to maximise the security level by basing decisio...
-
Chapter and Conference Paper
A Differentially Private Mechanism of Optimal Utility for a Region of Priors
The notion of differential privacy has emerged in the area of statistical databases as a measure of protection of the participants’ sensitive information, which can be compromised by selected queries. Differen...
-
Chapter and Conference Paper
HMM-Based Trust Model
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either assume fixed behaviour for the...
-
Chapter and Conference Paper
Probable Innocence in the Presence of Independent Knowledge
We analyse the Crowds anonymity protocol under the novel assumption that the attacker has independent knowledge on behavioural patterns of individual users. Under such conditions we study, reformulate and extend ...
-
Chapter and Conference Paper
Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols
The existing analysis of the Crowds anonymity protocol assumes that a participating member is either ’honest’ or ’corrupted.’ This paper generalises this analysis so that each member is assumed to maliciously ...