Nowdays, passwords are commonly used by people during a log in process that controls access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines and so on. A computer user may require passwords for many purposes: logging in to computer accounts, retrieving e-mail from servers, accessing programs, databases, networks, web sites, […]
The Basis Of Information Entropy
The current state of the art of privacy-preserving techniques in participatory sensing. The first implementation of a privacy aware architecture, named Anony Sense, for the anonymous task allocation and data reporting. From the perspective of cryptography, analyzed the realistic architectural assumptions and privacy requirements, and then provided an instantiation that achieved privacy protection in participatory […]
Method for measuring relationships using Generalized flow
To measure implicit relationships between two objects on the Wikipedia information network. The relationship is a more general concept than similarity, we discuss existing methods for measuring either relationships or similarities. A keyword has grown in this decade, while knowledge search has recently been researched to obtain knowledge of a single object and relationships between […]
Multi message dissemination over static and Mobile networks
A simple distributed gossip-style protocol that achieves near-optimal spreading rate for multimessage dissemination, with the assistance of mobility. The key observation is that random gossiping over static geometric graphs is inherently constrained by the expansion property of the underlying graph – capacity loss occurs since the copies are spatially constrained instead of being spread out. […]