Search for dissertations about: "Sonja Buchegger"

Showing result 1 - 5 of 10 swedish dissertations containing the words Sonja Buchegger.

  1. 1. Coping with Misbehavior in Mobile Ad-hoc Networks

    Author : Sonja Buchegger; Jean-Yves Le Boudec; EPFL; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; NATURVETENSKAP; NATURAL SCIENCES; mobile ad-hoc networks; incentives; cooperation; reputation systems; Bayes; SRA - ICT; SRA - Informations- och kommunikationsteknik;

    Abstract : n this work, we address the question of how to enable a system to operate despite the presence of misbehavior. Specifically, in a mobile ad-hoc network, how can we keep the network functional for normal nodes when other nodes do not route and forward correctly? Node misbehavior due to selfish or malicious reasons or faulty nodes can significantly degrade the performance of mobile ad-hoc networks. READ MORE

  2. 2. Social Networks and Privacy

    Author : Oleksandr Bodriagov; Sonja Buchegger; Melek Ӧnen; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; social networks; privacy; decentralized; encryption-based access control; Computer Science; Datalogi;

    Abstract : Centralized online social networks pose a threat to their users’ privacy as social network providers have unlimited access to users’ data. Decentralized social networks address this problem by getting rid of the provider and giving control to the users themselves, meaning that only the end-users themselves should be able to control access of other parties to their data. READ MORE

  3. 3. Protocol, mobility and adversary models for the verification of security

    Author : Volkan Cambazoglu; Christian Rohner; Björn Victor; Sonja Buchegger; Uppsala universitet; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Datavetenskap med inriktning mot datorkommunikation; Computer Science with specialization in Computer Communication;

    Abstract : The increasing heterogeneity of communicating devices, ranging from resource constrained battery driven sensor nodes to multi-core processor computers, challenges protocol design. We examine security and privacy protocols with respect to exterior factors such as users, adversaries, and computing and communication resources; and also interior factors such as the operations, the interactions and the parameters of a protocol. READ MORE

  4. 4. Privacy Analysis and Protocols for Decentralized Online Social Networks

    Author : Benjamin Greschbach; Sonja Buchegger; Simone Fischer-Hübner; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; privacy; online social networks; decentralization; Computer Science; Datalogi;

    Abstract : Decentralized Online Social Networks (DOSNs) are evolving as a promising approach to mitigate design-inherent privacy flaws of logically centralized services such as Facebook, Google+ or Twitter. Common approaches to implement a DOSN build upon a peer-to-peer (P2P) architecture in order to avoid the central aggregation of sensitive user data at one provider-controlled location. READ MORE

  5. 5. Privacy Issues in Decentralized Online Social Networks and other Decentralized Systems

    Author : Benjamin Greschbach; Sonja Buchegger; Melek Önen; KTH; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; Privacy; Online Social Networks; Decentralized Online Social Networks; Computer Science; Datalogi;

    Abstract : Popular Online Social Networks (OSNs), such as Facebook or Twitter, are logically centralized systems. The massive information aggregation of sensitive personal data at the central providers of these services is an inherent threat to the privacy of the users. READ MORE