Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Tommi Meskanen"'
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 31, Iss 1, Pp 181-188 (2022)
Several protocols for private set intersection are presented in the literature. When the sets are large these tend to be too slow for many purposes. We consider the problem of two parties finding out how many common friends they have in a privacy pre
Externí odkaz:
https://doaj.org/article/b8cc8c33cc51401f928c608de75e9874
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 29, Iss 1, Pp 290-300 (2021)
Parental control methods are a popular tool to keep children safe in the digital world. Usually, digital parental control methods function by disclosing the entire log of child's on-line activities to their parents, and therefore, these methods do no
Externí odkaz:
https://doaj.org/article/972d5c3e147a4c2981d63ea42fe5a319
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 27, Iss 1, Pp 150-156 (2020)
The necessity for peer-to-peer (p2p) communications is obvious; current centralized solutions are capturing and storing too much information from the individual people communicating with each other. Privacy concerns with a centralized solution in pos
Externí odkaz:
https://doaj.org/article/548cf15f8de44ec195a67774b088657f
Publikováno v:
Digital Communications and Networks, Vol 6, Iss 3, Pp 321-332 (2020)
We introduce a practical method to perform private membership tests. In this method, clients are able to test whether an item is in a set controlled by the server without revealing their query item to the server. After executing the queries, the cont
Externí odkaz:
https://doaj.org/article/8528fc908f734ef29e14b60ba85a51b5
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 426, Iss 22, Pp 217-223 (2018)
Trust relation in this work refers to permission that is given to a user at source-host to access another user at target-host through an authentication key with a unique fingerprint. We form a directed graph out of these trust relations, such that us
Externí odkaz:
https://doaj.org/article/721b5c61caff444a986621ee9d859b88
Publikováno v:
Meskanen, T, Kuusijärvi, J & Niemi, V 2021, ' Privacy-aware contact sharing for groups in P2P networks ', International Journal of Embedded and Real-Time Communication Systems, vol. 12, no. 4, pp. 36-54 . https://doi.org/10.4018/IJERTCS.2021100103
The need for peer-to-peer (p2p) communications is obvious because current centralized solutions are capturing and storing too much information from individuals communicating with each other. HELIOS platform introduces a new social media platform that
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 29, Iss 1, Pp 290-300 (2021)
FRUCT
FRUCT
Parental control methods are a popular tool to keep children safe in the digital world. Usually, digital parental control methods function by disclosing the entire log of child's on-line activities to their parents, and therefore, these methods do no
Children and teenagers that have been victims of bullying can possibly suffer its psychological effects for a lifetime. With the increase of online social media, cyberbullying incidents have been increased as well. In this paper, the authors discuss
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a9e40122f5b6f30693912f586ffeda49
https://doi.org/10.4018/978-1-6684-5594-4.ch030
https://doi.org/10.4018/978-1-6684-5594-4.ch030
Publikováno v:
International Journal of Embedded and Real-Time Communication Systems. 11:1-20
Children and teenagers that have been victims of bullying can possibly suffer its psychological effects for a lifetime. With the increase of online social media, cyberbullying incidents have been increased as well. In this paper, the authors discuss
Publikováno v:
Digital Communications and Networks, Vol 6, Iss 3, Pp 321-332 (2020)
Ramezanian S, Meskanen T, Naderpour M, Junnila V, Niemi V. Private membership test protocol with low communication complexity. Digital Communications and Networks. 2019 May 13. We introduce a practical method to perform private membership tests. In t