Search
Skip to Search Results
Filter
Subject / Keyword
Collections
Author / Creator / Contributor
Year
Languages
Item type
Departments
-
Fall 2014
By eavesdropping on a user's query in a sensor network, an adversary can deduce both the user's current location and his/her location of interest. Issuing k queries instead of one (our "k-query" scheme) protects the privacy of the user's location of interest, but facilitates the adversary...
1 - 1 of 1